Across
- 2. a cyberattack that takes advantage of a previously unknown or unaddressed security flaw in computer software, hardware, or firmware.
- 4. the fraudulent practice of sending emails or other messages pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 8. the fraudulent acquisition and use of a person's private identifying information, usually for financial gain
- 10. when a person posts information online that is untrue and damaging about another--generally done to shame, spread false rumors, and humiliate that person
- 11. any incident that results in unauthorized access to computer data, applications, networks, or devices
- 15. malicious marketing media that is used to interject malware into users' computers when they visit a website or click on an pop-up on the internet
- 17. an interruption in an authorized user's access to a network typically caused with malicious intent
- 20. gaining unauthorized access to data in a system or computer
- 21. the public release of private identifying information as a form of harassment
- 22. the part of the world wide web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable
- 23. the action, of demanding payment or benefit from someone in return for not revealing compromising or damaging information about them
Down
- 1. when a person uses extreme options, insults, and abusive language to get into online arguments on purpose
- 3. a work is reproduced, distributed, performed, or made into a derivative without the creator/owner's permission
- 5. the spread of behaviors, attitudes, and affect through crowds and other types of social aggregates from one member to another--peer influence
- 6. when individuals determine their own social and personal worth based on how they stack up against others
- 7. a use of the internet, especially a habitual or avid one
- 9. the untended download of software, typically malicious software that is used to steal and collect personal information or inject banking Trojans.
- 12. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- 13. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- 14. when someone posts or comments online to deliberately upset others
- 16. a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- 18. malware that attempts to scare users into thinking their device has been infected with a virus and then encourages them to quickly download a program (usually tainted) to fix it
- 19. the use, copying, or distribution of copyrighted material
