Chapter 5

12345678910111213141516171819
Across
  1. 1. Makes it illegal to circumvent antipiracy schemes in commercial software.
  2. 5. A program that restricts access to specified websites.
  3. 6. Any event or action that could cause a loss of or damage to computer or mobile device hardware.
  4. 8. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
  5. 11. A scam in which a button or link on a website contains a malicious program.
  6. 13. A notice that guarantees a user or a website is legitimate.
  7. 16. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
  8. 17. A group of compromised computers.
  9. 18. A common infringement of copyright.
  10. 19. A program that performs a repetitive task on a network.
Down
  1. 1. An assault whose purpose is to disrupt computer access to an Internet service
  2. 2. Protects any tangible form of expression.
  3. 3. Biometric device used in high security areas.
  4. 4. In the encryption process, the unencrypted, readable data.
  5. 7. Outlines the activities for which a computer or network may and may not be used.
  6. 9. Usually does not have advanced computer and technical skills.
  7. 10. An authorized person or company that issues and verifies digital certificates.
  8. 12. In the encryption process, the encrypted (scrambled) data.
  9. 14. Protects a network's resources from intrusion.
  10. 15. Most systems require that a user selects this on his or her own.