Across
- 3. malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- 8. a software utility designed to protect your computer or network against computer viruses.
- 9. a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
- 10. an occasion when one company steals secrets from another company with which it is competing.
- 12. a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- 14. the identification of a person by the measurement of their biological features.
Down
- 1. act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- 2. the process of encoding a message so that it can be read only by the sender and the intended recipient
- 4. a video camera that is used to observe a location.
- 5. a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- 6. a person whose job is to guard a place
- 7. a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- 11. a destructive self replicating program containing code capable of gaining access to computers or networks.
- 13. the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- 14. zombie network-is a group of infected computers that are under the control of one or more individuals.
