Across
- 2. Software programs designed to damage or do other unwanted actions on a computer; common examples of malware include viruses, worms, trojan horses, and spyware.
- 7. An attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
- 9. The address of a given unique resource on the Web. Often referred to as a web address.
- 11. A form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The attacker uses a made up scenario to trick the user.
- 12. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a fee is paid.
Down
- 1. A con that scammers use to electronically collect personal information from unsuspecting users
- 3. The process of identifying yourself and the verification that you're who you say you are.
- 4. A program used to access World Wide Web pages
- 5. An image, or a video or audio recording, that has been edited using an algorithm to replace the person in the original with someone else
- 6. The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
- 8. The part that comes after â@â in an email address, or after âwww.â in a web address
- 10. A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file; often used in conjunction with a username
- 11. A set of rules that regulate how computers exchange information.
