Across
- 4. a security identification and authentication device.
- 5. an individual who attempts to access computer systems without authorization
- 9. A crime in which payment is demanded in order to prevent or stop attacks on an organization's website, network or computer systems.
- 10. small files, often including unique identifiers that web servers send to browsers
- 11. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
- 13. premeditated, politically motivated attack against information, computer systems, computer programs and data, which results in violence against noncombatant targets by subnational groups or clandestine agents.
Down
- 1. the use of a computer as an instrument to further illegal ends
- 2. the use of a program to screen and/or exclude access to web pages or email deemed objectionable
- 3. software that displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device.
- 4. a process that copies all your files, data and information to effectively create two versions – one on your original devices and one backup.
- 5. crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs.
- 6. concerned with how fundamental ethical principles apply to a computing professional's conduct.
- 7. a process that transforms encrypted information into its original format
- 8. an operating system that runs from a disk drive
- 12. An undocumented way of gaining access to computer system
