Across
- 2. Although was originally a compliment, it is now a derogatory term referring to someone who accesses a computer or network illegally
- 3. Programs that act without a users knowledge and deliberately alter the computers operations
- 7. One whose owner is unaware the computer is being controlled remotely by an outsider
- 8. Technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
- 10. Verifies that the individual is the person they claim to be
- 12. A private combination of characters associated with user name allows access to certain computers
- 13. A potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the users knowledge
- 14. Online or internet based illegal acts
- 16. A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
- 17. A program that performs a repetitive task on a network
Down
- 1. Hardware or software that protects a networks resources from intrusion by users on another network such as the internet
- 2. A vulnerable computer that is set up to entice an intruder to break into it
- 4. Program, Protects a computer against viruses by identifying and removing any computer virus found in memory, storage, or incoming files
- 5. Software used by cybercriminals
- 6. Someone who accesses a computer or network illegally but has the intent of destroying data, stealing info, or other malicious actions
- 9. A server outside the organization's network that controls which communications pass into the organization's network
- 11. A numeric password either assigned by a company or selected by a user
- 15. A program that copies itself repeatedly, in memory or on a network using up resources and shutting down the computer or network
- 16. A group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks
