IT Security 1

12345678910111213141516171819202122232425262728
Across
  1. 3. is a type of malware that self-replicates and distributes copies of itself in a computer network.
  2. 5. refers to any crime that involves a computer and a network.
  3. 8. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  4. 9. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  5. 13. involves gaining access to a computer or network with authorization from a company or organisation.
  6. 14. This involves the illegal copying of information from the magnetic strip of a credit card.
  7. 15. is sequences of instructions that make a computer program perform a specific task.
  8. 17. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  9. 18. is another type of malware that is activated each time a computer system boots (loads) up.
  10. 19. also known as zombie is a group of computers connected together for malicious purposes.
  11. 20. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
  12. 21. is a software application that automatically displays advertising banners while the program is running.
  13. 22. is malicious software designed to install itself on a computer without the owner’s knowledge.
  14. 24. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. 25. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  16. 26. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  17. 27. This involves gaining personal information through deception.
  18. 28. is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. 1. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  2. 2. involves gaining access to a computer or network without authorization.
  3. 4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  4. 6. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  5. 7. is raw unorganized facts that need to be processed.
  6. 10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  7. 11. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. 12. The practice of recovering sensitive information from discarded material.
  9. 16. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  10. 19. is a secret way to access a computer without passing security mechanisms.
  11. 23. is the processed output of data making it meaningful to the person who receives it.