Across
- 2. Obtaining access to another system without permission.
- 5. software that lets a user to obtain information about another's computer activities.
- 9. is a software that blocks access to the victim's data and threatens to publish or delete it until ransom is paid.
- 11. is the attempt to obtain sensitive information such as usernames, passwords, and credit card details.
- 13. a person who gains unauthorized access to computer files or networks in order to further social or political ends.
- 14. the action of protecting, or the state of being protected.•a person or thing that protects someone or something.
- 15. software which is specifically designed to damage a computer system.
- 18. the process of converting information or data into a code, especially to prevent unauthorized access.
- 21. network of computers infected with malicious software and controlled as a group without the owners' knowledge.
- 22. software that gets into your devise without you knowing.
- 24. Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction.
- 26. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 27. Irrelevant messages sent over the Internet, typically to large numbers of users, for advertising.
Down
- 1. •a string of characters that allows access to a computer, interface, or system.
- 3. A group or system of interconnected people or things.
- 4. is a cyber attack redirecting a website's traffic to another from a fake site.It can be conducted by changing the hosts file on the computer.
- 6. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.
- 7. a situation involving exposure to danger.
- 8. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message.
- 10. software that attaches itself to all you contacts and sends itself to others in an endless cycle.
- 12. network an online community of people with a common interest who use a website or other technologies to communicate with each other and share information, resources You tend to be in a community with friends, colleagues and family.
- 16. the fraudulent practice of using another person's name and personal information in order to obtain credit, loans.
- 17. logger a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
- 19. an attempt by hackers to damage or destroy a computer network or system.
- 20. Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
- 23. a person who uses computers to gain unauthorized access to data.
- 25. In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable for the user.
