L31 Crossword: Computer Safety and Ethics

123456789101112131415161718192021222324252627
Across
  1. 6. A security method that requires more information than a password to authenticate your identity.
  2. 12. A small text file that a Web server puts on your computer to store information about you and your preferences.
  3. 13. Protects against unwanted access to or from all the computers in a network from one point.
  4. 14. A file that copies itself and triggers computer code to infect your computer.
  5. 15. A virus that does not cause damage until a specified date or until the system has been launched a certain number of times.
  6. 17. A malicious program that records keystrokes.
  7. 20. Provides remote access to software applications hosted on the Internet.
  8. 22. Blocks unauthorized access or use to or from a network based on the specified security criteria.
  9. 23. Refers to software in which the source code is available free of charge to the general public for use and/or modification.n
  10. 24. The suppression of Web content that is considered offensive or a threat to security.
  11. 25. Unlawful reproduction and/or distribution of any copyrighted digital files including videos, music, e-books, and software.
  12. 27. Encrypts information.
Down
  1. 1. Maleware that hides inside another program, and infects a computer when the program is installed.
  2. 2. Short for "malicious software," software that is designed to cause damage to a single computer server, or computer network.
  3. 3. A fraudulent attempt to steal one's personal information to commit identity theft.
  4. 4. Software that the developer has donated for public use or for which the copyright has expired; it is the only type of software that is not copy-right protected.
  5. 5. A virus triggered by the appearance or disappearance of specified data.
  6. 7. Harmful computer code that spreads without your interaction.
  7. 8. Technology that encrypts sensitive information and authenticates servers and clients to ensure a secure connection.
  8. 9. Copyrighted software the developer makes available to users free of charge, or for a voluntary fee.
  9. 10. Technology that encrypts sensitive information and authenticates servers and clients to ensure a secure connection.
  10. 11. Software that monitors your computing actions, usually while you are online, to collect information about you.
  11. 16. Noncommercial copyrighted software distributed free of charge, usually for a trial period; after the trial period, the license generally requires that users pay a fee for continued use.
  12. 18. Deciphers encrypted information.
  13. 19. An electronic document that verifies the identity of a person or company and confirms that they own a public key.
  14. 21. Software as a Service; provides remote access to software hosted in the Cloud.
  15. 26. Used to block content coming into and going out to the Internet.