Across
- 3. is a string of characters used for authenticating a user on acomputer system
- 6. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- 8. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 10. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- 11. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- 14. a local or restricted communications network, especially a private network created using World Wide Web software.
- 15. an electronic device for storing and processing data
- 16. is a type of malware that is often disguised as legitimate software
Down
- 1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- 2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- 4. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- 5. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- 7. The translation of data into a secret code.The most effective way to achieve data security.
- 9. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- 12. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- 13. software that is intended to damage or disable computers and computer systems.