Across
- 2. this document allows you to purchase software without receiving full rights to the program
- 6. a sole right to exclude others from making, using, or selling an invention
- 9. a malware that is designed to deny a user or organization access to files unless an amount of money or reward is met
- 10. a software design principle, where certain aspects of a program or module are inaccessible to clients/users
- 11. a document that stipulates constraints and practices that a user must agree to for access to a computer network, the internet, or a software program
- 13. the process of converting a message that has been rendered unreadable back to its original (readable)form
- 14. the process of protecting information or data by using mathematical models or letters to scramble it in such as way that one the parties who have the key to unscramble it can access it
- 17. software developed by a business and distributed free of charge
- 18. software that automatically displays or downloads advertising material when the user is online
- 19. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 21. the use of general human knowledge to deceive or manipulate individuals into divulging confidential or personal information
- 25. the process of verifying/validating a user or device to make sure they are whom they claim to be, before allowing access to a system or resources
- 26. the legal agreements between a service provider and a person who wants to use that service
- 27. commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software
- 29. a symbol, word, or words legally registered or established by use as representing a company or product
- 30. standard technology for securing an internet connection by encrypting data sent between a website and a browser
- 31. a security exercise where cybersecurity expert attempts to find and exploit vulnerabilities in a computer system
Down
- 1. a type of malware that spreads between computes causing damage to data and software
- 3. the exclusive, legal right given to an creator to publish, print, film, perform, record, any material, as well as authorize others to do the same
- 4. the process by which a server determines if the client has permission to use a resource or access to a file. Permission may be granted to specific files only.
- 5. a software program that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- 7. the basic rules of conduct users of technology should follow in order to be responsible digital citizens
- 8. the use and or distribution of copyrighted computer software in violation of the law
- 12. the practice of taking someone else's work or ideas and passing it off as one's own
- 15. the doctrine that brief excerpts of copyright material may be quoted for specific purposes
- 16. a program camouflaged as something else to breach the security of a computer system
- 20. software is code that is designed to be publicly accessible; anyone can inspect, modify, or enhance
- 22. the art of protecting networks, devices, and data from unauthorized access
- 23. a collection of compromised, hijacked computers and devices that are infected with malware and remotely controlled by a hacker
- 24. a collection of websites you visit, emails you send, and information you share online
- 28. software that is owned by an organization or individual