Across
- 3. / Program that copies itself repeatedly
- 4. / Type of cyber criminal
- 6. / Trademark
- 8. / Damage files and system software
- 9. / Malicious code spread through network
- 12. / Fast temporary storage
- 14. / Network security system
- 16. / Raw information
- 18. / Safeguard against information theft
- 20. / The code of acceptable behavior users should follow while on the internet .
- 21. / Online crime
- 25. / Protect against malicious code infection
- 26. / Artistic
- 27. / Patent
- 29. / Decrease hardware performance and sometimes damage data
Down
- 1. / Patent to be granted
- 2. / Protector used to protect against electrical power variation
- 5. / A small text file that web server stores on your computer
- 7. / Physical access control
- 10. / Exploitation of a vulnerability in DNS server software
- 11. / Duplicate files and programs
- 12. / Lock laptop
- 13. / Cryptography
- 15. / Monitor that is better than CRT
- 17. / Process of identifying an individual
- 19. / System failure
- 22. / A scam using email to get personal info
- 23. / Unauthorized software
- 24. / Intruder attempts to gain unauthorized access to user's system or information by pretending to be user
- 28. / Example of cryptography software