Module 6 Vocabulary: ncd0014

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 6. The process of copying files from a computer’s hard drive to be stored in a remote location.
  2. 10. The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.
  3. 11. Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.
  4. 15. A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
  5. 16. A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.
  6. 17. A device that maintains power to computer equipment in case of an interruption in the primary electrical source.
  7. 18. An attack that changes the device’s address so that data is sent to the attacker’s computer.
  8. 21. The process of unlocking encrypted information back into a readable format.
  9. 23. Attackers who are strongly motivated by principles or beliefs.
  10. 25. The security threat to a company that comes from its own employees, contractors, and business partners.
  11. 29. A category of attacks that attempts to trick the victim into giving valuable information to the attacker.
  12. 30. The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
  13. 31. A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
  14. 32. A security method of “scrambling” information as it is transmitted over a network.
  15. 33. Aches and pains associated with repeated and long-term usage of the devices.
  16. 35. A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
  17. 36. Government-sponsored attacker that launches computer attacks against their enemies.
  18. 37. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
  19. 38. Malware that hides inside another program, often one downloaded from the web.
  20. 40. An individual who attacks a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.
Down
  1. 1. In Computer Concepts, malicious computer code that reproduces itself on the same computer.
  2. 2. An individual who launches attacks against other users and their computers, also known as a threat actor.
  3. 3. A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
  4. 4. A way to verify your identity based on physical characteristics.
  5. 5. A method that combines multiple types of authentication to increase security.
  6. 7. Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.
  7. 8. In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
  8. 9. The state or condition of being free from public attention to the degree that you determine.
  9. 12. An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
  10. 13. An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so.
  11. 14. A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
  12. 19. Code attached to a file that verifies the identity of the creator of the file.
  13. 20. This central connection device needed for a home-based Wi-Fi network.
  14. 22. The process of sifting through big data to find the important questions that will yield fruitful results.
  15. 24. A wireless data network technology that provides high-speed data connections that do not require a physical connection.
  16. 26. In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length.
  17. 27. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
  18. 28. A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).
  19. 34. Using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
  20. 39. Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email.