Across
- 3. In the encryption process, the encrypted (scrambled) data.
- 7. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
- 8. A notice that guarantees a user or a website is legitimate.
- 11. In the encryption process, the unencrypted, readable data.
- 13. Biometric device used in high security areas.
- 14. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
- 15. A common infringement of copyright.
- 17. An assault whose purpose is to disrupt computer access to an Internet service
- 19. Most systems require that a user selects this on his or her own.
- 20. A group of compromised computers.
Down
- 1. Protects a network's resources from intrusion.
- 2. A program that restricts access to specified websites.
- 4. Usually does not have advanced computer and technical skills.
- 5. Any event or action that could cause a loss of or damage to computer or mobile device hardware.
- 6. A program that performs a repetitive task on a network.
- 9. An authorized person or company that issues and verifies digital certificates.
- 10. A scam in which a button or link on a website contains a malicious program.
- 12. Makes it illegal to circumvent antipiracy schemes in commercial software.
- 16. Protects any tangible form of expression.
- 18. Outlines the activities for which a computer or network may and may not be used.
