Learning Unit 2

123456789101112
Across
  1. 3. runs when the user launches an infected program or boots from an infected disk or USB drive. Keep a low profile because they need to spread widely without being detected
  2. 4. Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.
  3. 8. The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.
  4. 9. Someone who uses the Internet to illegally break into computers.
  5. 11. The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made.
  6. 12. A network of computers — maybe one of the machines is yours — that scammers have infected with hidden software to secretly send spam.
Down
  1. 1. is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  2. 2. The capturing of information from the magnetic stripe on your ATM and credit card by use of portable "skimmer" devices that are secretly installed on card-reading machines.
  3. 5. is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
  4. 6. is a type of malicious software -- or malware -- that is installed on a computing device.
  5. 7. Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
  6. 10. Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.