Across
- 3. A harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs.
- 8. ____ engineering Involves conning your way into acquiring information that you have no right to.
- 10. The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
- 12. Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
- 13. Software that is written with malicious intent to cause annoyance or damage.
- 14. The process of making computer and network systems more resistant to tampering or malicious software.
- 15. A software program or hardware device that is used to increase security on its network by blocking unwanted data.
Down
- 1. A type of virus that replicates and spreads itself.
- 2. A string of characters used to verify or “authenticate” a person’s identity.
- 4. An illegal activity that is committed with the use of a computer.
- 5. The procedure for making extra copies of data in case the original is lost or damaged.
- 6. A name used in conjunction with a password to gain access to a computer system or a network service.
- 7. When someone accesses a computer without permission.
- 9. Occurs when a user receives an e-mail that looks as if it is from a trusted source, asking them to click a link and log in to a website that mimics the genuine website.
- 11. A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.
