RU ITEC411

12345678910111213141516171819
Across
  1. 1. – Unwanted bulk email messages.
  2. 3. – Security system that blocks unauthorized access to a network.
  3. 7. – Legal protection for creative works.
  4. 8. – Deception intended for financial or personal gain.
  5. 10. - Program that attaches to files and spreads when those files are shared.
  6. 11. – (__ of Service) Attack that floods a system with traffic to make it unusable.
  7. 15. – Right to control personal information.
  8. 17. – Process of scrambling data to protect confidentiality.
  9. 18. - Fraudulent emails or websites that trick users into revealing personal information.
Down
  1. 1. – Persistent unwanted monitoring or following online.
  2. 2. – the kind of theft that means stealing personal information to impersonate someone.
  3. 4. – Rules enforced by government to regulate behavior.
  4. 5. – Self-replicating program that spreads independently across networks.
  5. 6. – Harassment or intimidation carried out through digital communication.
  6. 9. – Illegal copying or distribution of software, music, or movies.
  7. 12. – Moral principles guiding responsible technology use.
  8. 13. - Software created to damage, disrupt, or gain unauthorized control of systems.
  9. 14. – Malicious program disguised as legitimate software.
  10. 16. – Measures taken to protect systems and data.
  11. 19. - Person who gains unauthorized access to computer systems.