Across
- 2. the process of gaining root access to the iOS operating system that runs on Apple devices, including the iPad, iPhone and iPod Touch.
- 5. the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.
- 8. reporting an immoral or illegal activity.
- 9. redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website.
- 10. any software that brings harm to a computer system.
Down
- 1. a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
- 3. the process of using an algorithm to transform information to make it unreadable for unauthorized users.
- 4. Worm a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
- 6. of Ethics the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
- 7. a technology that tracks and records consecutive key strokes on a keyboard.
