Across
- 3. User who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
- 5. Program that secretly collects information about the user and send the gathered information to the outside source while the user is online.
- 6. A kind of malware that replicates itself causing a computer to shutdown
- 9. Small text file that contains data about the user and his/her viewing preferences a web server stores on the computer.
- 10. Computer enthusiast who accesses a computer or network illegally and claim the intent of his/her security breaches.
- 12. Cyber __________ are perpetrators who demand payment to stop an attack on an organization’s technology infrastructure.
- 13. a kind of malware that alters how computer works
- 14. A program that performs repetitive task on a network.
Down
- 1. Software ________ refers to unauthorized and illegal duplication of copyrighted software.
- 2. is the process of converting data that is readable by humans into ciphertext to prevent unauthorized access.
- 4. Cyber __________ an attack whose goal ranges from disabling a government’s computer network to crippling a country
- 5. a technique that intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
- 7. An image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.
- 8. A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
- 11. a kind of malware that displays online advertisement in a form of a banner or pop-ups
