Privacy, Security, and Common Security Problems

1234567891011121314151617181920212223
Across
  1. 2. a cyberattack that takes advantage of a previously unknown or unaddressed security flaw in computer software, hardware, or firmware.
  2. 4. the fraudulent practice of sending emails or other messages pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  3. 8. the fraudulent acquisition and use of a person's private identifying information, usually for financial gain
  4. 10. when a person posts information online that is untrue and damaging about another--generally done to shame, spread false rumors, and humiliate that person
  5. 11. any incident that results in unauthorized access to computer data, applications, networks, or devices
  6. 15. malicious marketing media that is used to interject malware into users' computers when they visit a website or click on an pop-up on the internet
  7. 17. an interruption in an authorized user's access to a network typically caused with malicious intent
  8. 20. gaining unauthorized access to data in a system or computer
  9. 21. the public release of private identifying information as a form of harassment
  10. 22. the part of the world wide web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable
  11. 23. the action, of demanding payment or benefit from someone in return for not revealing compromising or damaging information about them
Down
  1. 1. when a person uses extreme options, insults, and abusive language to get into online arguments on purpose
  2. 3. a work is reproduced, distributed, performed, or made into a derivative without the creator/owner's permission
  3. 5. the spread of behaviors, attitudes, and affect through crowds and other types of social aggregates from one member to another--peer influence
  4. 6. when individuals determine their own social and personal worth based on how they stack up against others
  5. 7. a use of the internet, especially a habitual or avid one
  6. 9. the untended download of software, typically malicious software that is used to steal and collect personal information or inject banking Trojans.
  7. 12. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
  8. 13. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  9. 14. when someone posts or comments online to deliberately upset others
  10. 16. a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
  11. 18. malware that attempts to scare users into thinking their device has been infected with a virus and then encourages them to quickly download a program (usually tainted) to fix it
  12. 19. the use, copying, or distribution of copyrighted material