Computer Security

1234567891011121314151617181920212223242526
Across
  1. 2. Anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen but has the potential to cause serious damage.
  2. 6. Use of modern electronic means to manipulate an event or influence public perception toward a certain point of view.
  3. 8. Misuse This refers to entering a computer system without permission (hacking).
  4. 10. An attempt to make a machine or network resource unavailable to its intended users, such as temporarily or indefinitely interrupting or suspending services of a host connected to the internet.
  5. 13. Software that installs itself onto devices and then steals personal information about the user, like passwords, email addresses and other important information.
  6. 14. An action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS).
  7. 15. Is the use of technology to harass, threaten, embarrass, or target another person.
  8. 17. Pretends it will be a useful and safe program.
  9. 20. When someone accesses information without permission.
  10. 23. Theft Is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
  11. 24. A security barrier designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside.
  12. 25. Copying and distributing of recordings of a piece of music for which the rights owners (composer, recording artist, or copyright-holding record company) did not give consent.
  13. 26. Sending the same message indiscriminately to a large number of internet users.
Down
  1. 1. The act of intercepting communications between two points.
  2. 3. A flaw or weakness in a system or network that could leave it open to attacks or allow an attacker to manipulate the system in some way.
  3. 4. The protection of computing systems and the data that they store or access.
  4. 5. An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission.
  5. 7. The practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information online.
  6. 9. A malicious program or code that attaches itself to another program or file and can replicate itself, thereby infecting other systems.
  7. 11. Can spread from device to device, but unlike a virus they don’t need to attach themselves to other programs.
  8. 12. Gaining unauthorized access to data in a system or computer.
  9. 16. A network of private computers infected with malicious software and controlled as a group without the owner's knowledge, often used to send spam.
  10. 18. The act of illegally using, copying or distributing software without ownership or legal rights.
  11. 19. Any illegal activity that uses a computer as its primary means of commission.
  12. 21. Covert activities, such as the theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
  13. 22. The practice of using another person's name and personal information to obtain credit, loans, etc.