Across
- 2. search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent
- 3. the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers
- 7. ______ ______ system typically called DNS (2 words)
- 9. the condition of being anonymous
- 10. part of the World Wide Web whose contents are not indexed by standard web search-engines (2 words)
- 11. the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information (2 words)
- 12. _____ ______ networks typically called a LAN (2 words)
- 14. ________ __________information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual(2 words)
- 15. type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
Down
- 1. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 2. One's unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices (2 words)
- 4. ______ ________ address is the numerical value assigned to each device connected to a network (2 words)
- 5. an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner (2 words)
- 6. ________ ________ translation is the method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device (2 words)
- 8. ______ _______ locator typically called a URL (2 words)
- 13. World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access (2 words)
- 16. _____ ______ networks typically called a WAN (2 words)
