Across
- 6. process of converting data that is readable by humans into encoded characters to prevent unauthorized access
- 8. Someone who accesses a computer or network illegally
- 11. Programs that act without a users knowledge and alter the operations of computers
- 12. Someone who demands payment to stop an attack on an organizations technology infrastructure
- 13. program that displays an online advertisement in a banner on webpages email or other Internet services
- 14. kiddie Cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
- 16. small text file that a web server stores on your computer
- 17. process of decoding encrypted data
Down
- 1. technique intruders use to make their network appear legitimate to a victim computer
- 2. Someone who uses the Internet to destroy or damage computers for political reasons
- 3. program placed on a computer or mobile device without the users knowledge
- 4. compromised computer whose owner is unaware the computer is being controlled by an outsider
- 5. Hardware or software that protects a network’s resources from intrusion by users on another network
- 7. Someone who accesses a computer or network illegally
- 9. Online illegal acts
- 10. numeric password
- 15. group of compromised computers connected to a network that are used to attack other networks