Across
- 7. A Numeric password
- 9. A copy of a file, program, or media
- 10. A program that displays an online advertisement
- 12. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action
- 13. The process of converting data that is readable by humans into encoded characters
- 16. Someone who uses the Internet or network to destroy or damage computers for political reasons
- 17. Copying backed up files to their original location
- 19. Hardware and/or software that protects a network’s resources
- 20. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft
Down
- 1. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
- 2. A compromised computer or device
- 3. A program that displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services
- 4. A program placed on a computer or mobile device that secretly collects information
- 5. Someone who accesses a computer or network illegally
- 6. The unauthorized and illegal duplication of copyrighted software
- 8. The process of decoding encrypted data
- 11. A group of compromised computers or mobile devices connected to a network
- 14. A small text file that a web server stores on your computer
- 15. A private combination of characters associated with a user name
- 18. A technique intruders use to make their network or Internet transmission appear legitimate
