Across
- 2. computer code, often carried in a separate program, that can replicate itself to corrupt or otherwise harm either data files or the software used to process these files
- 5. seemingly innocent program that conceals malicious code that will be executed
- 9. activity by computer programmers to break into e-mails, websites, computer systems, and files of other computer users.
- 11. software used to detect and remove malicious software from a computer
- 12. software designed to cause enough anxiety that the computer user leaps at the chance to opt for a poor choice
- 13. collection of software that enables unauthorized access to a computer that is not normally permitted
- 15. manipulation or destruction of data found in cyberspace. It is unethical and can be illegal.
- 16. software application that automatically performs Internet-based activities; also known as a web robot
- 19. used to automatically route incoming e-mail to a specified inbox folder; also called rules
- 20. downloading copyrighted material without permission of the copyright holder
- 21. principles of what is right ad wrong that help people make decisions
- 22. software that secretly collects a user's data and behavior
- 23. device that joins two networks
- 24. phrase composed of real words on which a password is based
- 25. online threat in which a virus or other malware infects the computer and takes control of your web browser
- 27. code that functions similarly to a virus but is a standalone computer program that replicates itself in order to spread to other computers
- 29. act of limiting access to information or removing information to prevent the information from being seen
Down
- 1. (completely automated public Turing test to tell computers and humans apart) brief online test to determine whether the request for access comes from a computer or a human
- 3. illegal act that involves stealing someone's personal information and using that information to commit theft or fraud
- 4. software that intentionally performs actions to disrupt the operation of a computer system, collect private information, or otherwise harm the computer or user.
- 6. act of employing manipulative techniques designed to lure unwary computer users into launching an infected file or opening a link to an infected website
- 7. (UPS) device that protects computer systems and files against power surges and outages
- 8. small text file that websites put on the computer hard disk drive when a user visits the websites
- 10. controls traffic to an individual machine
- 13. type of malware that encrypts files or blocks the user's access to programs until the user pays to unlock them
- 14. message or window that appears on top of or under the page you are viewing.
- 17. password that is difficult for both computers and humans to crack
- 18. location of temporary files
- 26. software that creates advertisements designed to drive the user to another website
- 28. attempt to obtain sensitive information by appearing as a harmless request
