module 5

1234567891011121314151617
Across
  1. 6. process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  2. 8. Someone who accesses a computer or network illegally
  3. 11. Programs that act without a users knowledge and alter the operations of computers
  4. 12. Someone who demands payment to stop an attack on an organizations technology infrastructure
  5. 13. program that displays an online advertisement in a banner on webpages email or other Internet services
  6. 14. kiddie Cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
  7. 16. small text file that a web server stores on your computer
  8. 17. process of decoding encrypted data
Down
  1. 1. technique intruders use to make their network appear legitimate to a victim computer
  2. 2. Someone who uses the Internet to destroy or damage computers for political reasons
  3. 3. program placed on a computer or mobile device without the users knowledge
  4. 4. compromised computer whose owner is unaware the computer is being controlled by an outsider
  5. 5. Hardware or software that protects a network’s resources from intrusion by users on another network
  6. 7. Someone who accesses a computer or network illegally
  7. 9. Online illegal acts
  8. 10. numeric password
  9. 15. group of compromised computers connected to a network that are used to attack other networks