Across
- 5. This involves the illegal copying of information from the magnetic strip of a credit card.
- 8. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- 10. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- 14. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- 16. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- 17. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- 19. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- 21. is another type of malware that is activated each time a computer system boots (loads) up.
- 22. involves gaining access to a computer or network with authorization from a company or organisation.
- 24. is the processed output of data making it meaningful to the person who receives it.
- 25. This involves gaining personal information through deception.
- 28. involves gaining access to a computer or network without authorization.
- 29. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
- 1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
- 2. also known as zombie is a group of computers connected together for malicious purposes.
- 3. is a software application that automatically displays advertising banners while the program is running.
- 4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- 6. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- 7. is a secret way to access a computer without passing security mechanisms.
- 9. is a program that secretly installs itself on computers and collects information about users without their knowledge.
- 11. refers to any crime that involves a computer and a network.
- 12. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- 13. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- 15. is raw unorganized facts that need to be processed.
- 18. is malicious software designed to install itself on a computer without the owner’s knowledge.
- 20. The practice of recovering sensitive information from discarded material.
- 23. is a system designed to prevent unauthorized access to or from a private network (LAN).
- 26. is sequences of instructions that make a computer program perform a specific task.
- 27. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
