Across
- 2. A computer crime that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things in value, or to cause loss.
- 4. An attempt to deceive an audience into believing that something false is real.
- 6. Personal information scams.
- 8. Examines a fingerprint, a voice pattern, or the iris or retina of the eye for security purposes.
- 13. A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
- 14. Illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
- 15. Stories which at one time could have been partially true, but have grown from constant retelling into a mythical yarn.
- 17. Helps decrease the amount of spam received by most users.
Down
- 1. A virus that does something different from what it is expected to do.
- 3. A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
- 5. Formats originally developed to facilitate the syndication of news articles.
- 7. This uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people.
- 9. Used in blogs and other informational sites to simplify the search process.
- 10. Unsolicited advertisements, flyers, and catalogs in your regular mail - also known as junk mail.
- 11. A program that has been written, usually by a hacker, to cause corruption of data on a computer.
- 12. Makes many copies of itself, resulting in the consumption of the system resources that slows down or actually halts tasks.
- 16. A virus triggered by the appearance or disappearance of specified data.
