Module 5

12345678910111213
Across
  1. 4. a security identification and authentication device.
  2. 5. an individual who attempts to access computer systems without authorization
  3. 9. A crime in which payment is demanded in order to prevent or stop attacks on an organization's website, network or computer systems.
  4. 10. small files, often including unique identifiers that web servers send to browsers
  5. 11. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
  6. 13. premeditated, politically motivated attack against information, computer systems, computer programs and data, which results in violence against noncombatant targets by subnational groups or clandestine agents.
Down
  1. 1. the use of a computer as an instrument to further illegal ends
  2. 2. the use of a program to screen and/or exclude access to web pages or email deemed objectionable
  3. 3. software that displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device.
  4. 4. a process that copies all your files, data and information to effectively create two versions – one on your original devices and one backup.
  5. 5. crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs.
  6. 6. concerned with how fundamental ethical principles apply to a computing professional's conduct.
  7. 7. a process that transforms encrypted information into its original format
  8. 8. an operating system that runs from a disk drive
  9. 12. An undocumented way of gaining access to computer system