Across
- 3. – Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action.
- 8. – Criminal acts using computers, networks and/or the Internet
- 9. – Software that has advertisements embedded into the program
- 10. – Software that detects and removes spyware from a computer
- 15. – Malware that locks a computer system or encrypts computer files until a “ransom” fee is paid
- 16. – Electronic junk mail
Down
- 1. Forensics – Investigation and analysis techniques that gather and preserve data from a computing device
- 2. Theft – All types of crime in which someone obtains and uses another person’s personal data in a way that involves fraud or deception, typically for economic gain
- 4. – Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer
- 5. – Person who uses the Internet to access personal or business computers without permission
- 6. – A variation of phishing using SMS (short message service) to send misleading text messages
- 7. – Short for “malicious software;” includes viruses and spyware that steal personal information, send spam and commit fraud
- 11. – Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft
- 12. – A subclass of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times
- 13. – Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data
- 14. logger or keylogger – Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to ensure computer use is work-related)