Across
- 3. is a type of malware that self-replicates and distributes copies of itself in a computer network.
- 5. refers to any crime that involves a computer and a network.
- 8. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- 9. is a program that secretly installs itself on computers and collects information about users without their knowledge.
- 13. involves gaining access to a computer or network with authorization from a company or organisation.
- 14. This involves the illegal copying of information from the magnetic strip of a credit card.
- 15. is sequences of instructions that make a computer program perform a specific task.
- 17. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- 18. is another type of malware that is activated each time a computer system boots (loads) up.
- 19. also known as zombie is a group of computers connected together for malicious purposes.
- 20. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
- 21. is a software application that automatically displays advertising banners while the program is running.
- 22. is malicious software designed to install itself on a computer without the owner’s knowledge.
- 24. is a system designed to prevent unauthorized access to or from a private network (LAN).
- 25. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- 26. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- 27. This involves gaining personal information through deception.
- 28. is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- 1. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- 2. involves gaining access to a computer or network without authorization.
- 4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- 6. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- 7. is raw unorganized facts that need to be processed.
- 10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- 11. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- 12. The practice of recovering sensitive information from discarded material.
- 16. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- 19. is a secret way to access a computer without passing security mechanisms.
- 23. is the processed output of data making it meaningful to the person who receives it.
