Chapter 5

1234567891011121314151617181920
Across
  1. 3. In the encryption process, the encrypted (scrambled) data.
  2. 7. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
  3. 8. A notice that guarantees a user or a website is legitimate.
  4. 11. In the encryption process, the unencrypted, readable data.
  5. 13. Biometric device used in high security areas.
  6. 14. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
  7. 15. A common infringement of copyright.
  8. 17. An assault whose purpose is to disrupt computer access to an Internet service
  9. 19. Most systems require that a user selects this on his or her own.
  10. 20. A group of compromised computers.
Down
  1. 1. Protects a network's resources from intrusion.
  2. 2. A program that restricts access to specified websites.
  3. 4. Usually does not have advanced computer and technical skills.
  4. 5. Any event or action that could cause a loss of or damage to computer or mobile device hardware.
  5. 6. A program that performs a repetitive task on a network.
  6. 9. An authorized person or company that issues and verifies digital certificates.
  7. 10. A scam in which a button or link on a website contains a malicious program.
  8. 12. Makes it illegal to circumvent antipiracy schemes in commercial software.
  9. 16. Protects any tangible form of expression.
  10. 18. Outlines the activities for which a computer or network may and may not be used.