Computer Security and Viruses

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. A group of two or more computer systems linked together.
  2. 4. The study of people's efficiency in their working environment.
  3. 8. The process by which you store the files on a single storage media with no secondary copies.
  4. 10. A program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
  5. 11. A program designed to detect and destroy computer viruses.
  6. 15. A way of backing up the computer that allows you to store the entire computer, including the operating system and programs, in a single file (an “image”) that can be used to restore the computer to exactly the way it was when the image was made.
  7. 16. The process of using an algorithm to transform information to make it unreadable for unauthorized users.
  8. 18. An act of crime in which a computer is the object of the crime.
  9. 19. an electronic discovery technique used to determine and reveal technical criminal evidence.
  10. 21. The act of making set of instructions.
  11. 23. The programs and other operating information used by a computer.
  12. 26. A software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  13. 27. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  14. 29. A feature or defect of a computer system that allows surreptitious unauthorized access to data.
  15. 30. It is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
  16. 32. Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Down
  1. 2. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or PDA.
  2. 3. The acto of gaining unauthorized access to protected data.
  3. 5. A software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  4. 6. An act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.
  5. 7. A person within a group or organization, especially someone privy to information unavailable to others.
  6. 9. It refers to the physical parts of a computer system.
  7. 12. The state of being free from danger or threat.
  8. 13. The distinct pieces of digital information.
  9. 14. An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
  10. 17. The use of computers and related resources in an environmentally responsible manner.
  11. 18. A person who breaks into a computer system, typically for an illegal purpose.
  12. 20. The Father of Computers.
  13. 21. A person that codes the set of instructions for the computer.
  14. 22. A software that is intended to damage or disable computers and computer systems.
  15. 23. Refers to tricking or deceiving computer systems or other computer users
  16. 24. An organized collection of data.
  17. 25. A type of network, the "V" in VPN.
  18. 28. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  19. 31. A person who uses computers to gain unauthorized access to protected data.