Across
- 5. The transformation of data into a code that can only be decrypted through the use of a secret key or password.
- 9. Illegal activity performed using computer technology.
- 10. Named for a wartime demilitarized zone, a network between the internal network and the Internet with a firewall on both sides.
- 11. Unsolicited email, (most often seeking financial gain for the sender). This includes email from a legitimate source selling a real service or product, but if you did not give them permission to send such information to you, it is considered spam.
- 13. Malicious software. Any software security threat.
- 15. A hardware device or software that protects a network or computer by examining traffic and rejecting certain traffic based on a set of rules.
- 17. A physical device that can be used in authentication, either alone or together with a user name and password.
- 21. A person who initiates and controls a botnet.
- 22. A confidential string of characters that a user enters (along with a user name) in order to be authenticated.
- 23. Someone who uses a computer to cause destruction without regard to its effect on humanity.
- 24. Another name for a keystroke logger.
- 25. An acronym for "Spam over Instant Messaging;" the perpetrators are called spimmers.
- 26. A self-replicating computer virus.
- 27. A program that is installed and activated on a computer by appearing to be something harmless, which the user innocently installs. This is a common way that a virus or a worm can infect a computer.
- 29. A program that is installed and activated on a computer without the knowledge or permission of the user. At the least the intent is mischief, but most often it intends to be genuinely damaging in one way or another.
- 31. The act of covertly obtaining information broadcast from wireless devices using the Bluetooth standard, a short-range wireless standard used for data exchange between computers and mobile devices.
- 34. A malware attack that takes advantage of some vulnerability in our computers or networks.
- 35. A server created as a decoy to draw malware attacks and gather information about attackers.
- 36. An individual computer in a botnet, so-called because it mindlessly serves the person who originated the botnet.
Down
- 1. Someone with a great deal of computer programming skills who invades private computers and networks.
- 2. A group of networked computers that, usually unbeknown to their owners, have been infected with programs that forward information to other computers over the network.
- 3. An online payment system.
- 4. Very small text files an Internet browser saves on the local hard drive at the request of a web site.
- 6. The use of computers to cause destruction without regard to its effect on humanity.
- 7. The information that accompanies a message but does not appear in the message.
- 8. A form of spyware software that collects information about the user in order to display user-targeted advertisements.
- 12. A mode by which malware infects a computer.
- 14. Validation of a user account and password that occurs before the security components of an OS give a user access to the computer network.
- 16. A category of software that runs surreptitiously on a user's computer, gathers information without permission from the user, and then sends that information to the people or organizations that requested the information.
- 18. The process of both authenticating a user and determining the permissions that the user has for a resource.
- 19. Malware that threatens to do damage or lock the victim out of a computer unless he or she pays a fee.
- 20. A person who breaks laws using computer technology.
- 25. Similar to a Trojan Horse (see below), an advertisement that appears to be something harmless and that offers to take some action, such as pretending to scan your computer for problems, but the results will be bogus.
- 28. A fraudulent method of obtaining personal financial information through web page pop-ups, email, and even via letters mailed via the postal service.
- 30. Malware that hides itself from detection by anti-malware programs by concealing itself within the OS code or in any other program running on the computer.
- 32. The use of deceit and trickery to persuade someone to hand over money or other valuables.
- 33. A Wi-Fi network that connects to the Internet through a router.
