Computer Security and Safety, Ethics, and Privacy

12345678910111213141516171819202122232425
Across
  1. 2. The act of defacing or destroying computer equipment.
  2. 5. A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
  3. 8. supplies A device that allows a computer to keep running for at least a short time when the primary power source is lost.
  4. 9. The moral guidelines that govern the use of computers and information systems.
  5. 10. A notice that guarantees a user or a Web site is legitimate.
  6. 12. The act of stealing computer equipment.
  7. 13. is the discovery, collection, and analysis of evidence found on computers and networks.
  8. 14. The prolonged malfunction of a computer.
  9. 17. The authorization that grants one user the right to use a software package
  10. 19. Occurs when someone steals software media, intentionally erases programs, illegally copies a program, and illegally registers and/or activates a program.
  11. 21. Occurs when someone steals personal or confidential information.
  12. 22. A process of converting readable data into unreadable characters to prevent unauthorized access.
  13. 24. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  14. 25. An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
Down
  1. 1. The rights to which creators are entitled for their work.
  2. 3. The act of verifying protected electronic data and involves the required activation by the consumer shortly or directly after purchasing the software or service.
  3. 4. Allows individuals to detect wireless networks while driving a vehicle through the area.
  4. 6. A condition resulting from focusing the eyes on a computer or other display device for protracted, uninterrupted periods of time.
  5. 7. An appliance or device designed to protect electrical devices from voltage spikes.
  6. 11. A strategy designed to prevent illegal distribution of movies, music, and other digital content.
  7. 15. Occurs when someone the computer consumes someone's entire social life.
  8. 16. Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital in a computer.
  9. 18. A condition in which the prolonged performance of repetitive actions, typically with the hands, causes pain or impairment of function in the tendons and muscles involved.
  10. 20. protects any tangible form of expression.
  11. 23. Any item that you must carry to gain access to a computer or computer facility.