ISCC : Chapter 7 Security, Ethics & Privacy Crossword

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 3. - Moral guidelines governing the use of computers and information systems
  2. 4. - Rules defining how computer systems may be used
  3. 6. - An attack where communications are secretly intercepted
  4. 7. - Security process requiring two forms of authentication
  5. 8. - Encrypted code used to verify the sender of a message
  6. 9. - Malicious software disguised as a legitimate program
  7. 10. - Security method using physical characteristics for identification
  8. 11. - Using computer resources for illegal or unapproved activities
  9. 13. - A combination of words used for secure authentication
  10. 17. - A small text file stored on a user’s computer by a web server
  11. 22. - A duplicate copy of data for recovery purposes
  12. 23. - An attack that disrupts access to an online service by overwhelming it
  13. 25. - Manipulating people to gain unauthorized access to information
  14. 27. - Converting readable data into an unreadable format for protection
  15. 29. - A self-replicating program that spreads across networks without user action
  16. 30. - Any event that can cause loss of data, hardware, software, or processing capability
  17. 33. - Illegal activities carried out using computers or the internet
  18. 34. - Fraudulent emails designed to steal personal information
  19. 35. - Stealing confidential or personal data
  20. 36. - A hidden method used to bypass normal security controls
  21. 38. - Using a computer or network without permission
Down
  1. 1. - A crime where attackers demand payment to stop an attack
  2. 2. - A plan to restore systems after a major failure
  3. 5. - Software that detects and removes malicious programs
  4. 12. - A person who gains unauthorized access to computer systems
  5. 14. - The right to control how personal data is collected and used
  6. 15. - Hardware or software that protects a network from intrusion
  7. 16. - Illegal copying or distribution of software
  8. 18. - Trusted organization that issues digital certificates
  9. 19. - Redirecting users to a fake website that appears legitimate
  10. 20. - A network of infected computers controlled by an attacker
  11. 21. - Science of designing workspaces for comfort and safety
  12. 24. - An inexperienced attacker who uses existing hacking tools
  13. 26. - A malicious program that attaches itself to files and damages systems
  14. 28. - Stealing physical computer equipment
  15. 31. - Reducing environmental impact through efficient computer use
  16. 32. - Digital records of user behavior collected online
  17. 37. - A denial-of-service attack launched from multiple compromised devices