IT Security 1

1234567891011121314151617181920212223242526272829
Across
  1. 5. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. 8. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. 10. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. 14. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. 16. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. 17. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. 19. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. 21. is another type of malware that is activated each time a computer system boots (loads) up.
  9. 22. involves gaining access to a computer or network with authorization from a company or organisation.
  10. 24. is the processed output of data making it meaningful to the person who receives it.
  11. 25. This involves gaining personal information through deception.
  12. 28. involves gaining access to a computer or network without authorization.
  13. 29. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. 1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. 2. also known as zombie is a group of computers connected together for malicious purposes.
  3. 3. is a software application that automatically displays advertising banners while the program is running.
  4. 4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. 6. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. 7. is a secret way to access a computer without passing security mechanisms.
  7. 9. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. 11. refers to any crime that involves a computer and a network.
  9. 12. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. 13. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. 15. is raw unorganized facts that need to be processed.
  12. 18. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. 20. The practice of recovering sensitive information from discarded material.
  14. 23. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. 26. is sequences of instructions that make a computer program perform a specific task.
  16. 27. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.