Computer Threats and Security

1234567891011121314
Across
  1. 3. malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
  2. 8. a software utility designed to protect your computer or network against computer viruses.
  3. 9. a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
  4. 10. an occasion when one company steals secrets from another company with which it is competing.
  5. 12. a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
  6. 14. the identification of a person by the measurement of their biological features.
Down
  1. 1. act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
  2. 2. the process of encoding a message so that it can be read only by the sender and the intended recipient
  3. 4. a video camera that is used to observe a location.
  4. 5. a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
  5. 6. a person whose job is to guard a place
  6. 7. a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
  7. 11. a destructive self replicating program containing code capable of gaining access to computers or networks.
  8. 13. the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
  9. 14. zombie network-is a group of infected computers that are under the control of one or more individuals.