Across
- 3. - Moral guidelines governing the use of computers and information systems
- 4. - Rules defining how computer systems may be used
- 6. - An attack where communications are secretly intercepted
- 7. - Security process requiring two forms of authentication
- 8. - Encrypted code used to verify the sender of a message
- 9. - Malicious software disguised as a legitimate program
- 10. - Security method using physical characteristics for identification
- 11. - Using computer resources for illegal or unapproved activities
- 13. - A combination of words used for secure authentication
- 17. - A small text file stored on a user’s computer by a web server
- 22. - A duplicate copy of data for recovery purposes
- 23. - An attack that disrupts access to an online service by overwhelming it
- 25. - Manipulating people to gain unauthorized access to information
- 27. - Converting readable data into an unreadable format for protection
- 29. - A self-replicating program that spreads across networks without user action
- 30. - Any event that can cause loss of data, hardware, software, or processing capability
- 33. - Illegal activities carried out using computers or the internet
- 34. - Fraudulent emails designed to steal personal information
- 35. - Stealing confidential or personal data
- 36. - A hidden method used to bypass normal security controls
- 38. - Using a computer or network without permission
Down
- 1. - A crime where attackers demand payment to stop an attack
- 2. - A plan to restore systems after a major failure
- 5. - Software that detects and removes malicious programs
- 12. - A person who gains unauthorized access to computer systems
- 14. - The right to control how personal data is collected and used
- 15. - Hardware or software that protects a network from intrusion
- 16. - Illegal copying or distribution of software
- 18. - Trusted organization that issues digital certificates
- 19. - Redirecting users to a fake website that appears legitimate
- 20. - A network of infected computers controlled by an attacker
- 21. - Science of designing workspaces for comfort and safety
- 24. - An inexperienced attacker who uses existing hacking tools
- 26. - A malicious program that attaches itself to files and damages systems
- 28. - Stealing physical computer equipment
- 31. - Reducing environmental impact through efficient computer use
- 32. - Digital records of user behavior collected online
- 37. - A denial-of-service attack launched from multiple compromised devices
