Across
- 3. Hardware or software designed to prevent unauthorized access to or from a private network
- 6. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 8. When someone sends an email with a link to a bogus website, it is called.....
- 9. Software ..... is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation of software products or unauthorized versions of software products
- 12. Software programs that protect your computer from internet virus and malicious code
- 14. Threating behavior facilitated through electrical means such as texting
- 15. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information
Down
- 1. ..... force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- 2. Malicious program that uses a computer network to replicate
- 4. Fraudulent phone calls
- 5. Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction
- 7. You should not just check identity, you should also confirm.....
- 10. The process of taking plain text and scrambling it into an unreadable format
- 11. Malicious computer code that reproduce itself
- 13. This can slow down your computer and watch everywhere you go