Across
- 1. Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
- 5. A form of authenticating who you are, by using ones body part.
- 6. A form of stealing that usually involves impersonating someone or something.
- 7. A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
- 9. Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
- 13. Something that you access on the internet, a page of sorts.
- 15. A software that is attached to other software, program, picture, etc., that tends to replicates itself.
- 16. This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
- 19. A way of hiding information that you do not want someone knowing, if intercepted.
- 20. Preventing someone information that may be viewed as harmful from being seen from the public.
Down
- 2. The conduct of a persons character and obligations to others.
- 3. A kind of warfare that is virtual.
- 4. A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
- 8. In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
- 10. A group of people and how they work together as a society.
- 11. Someone that is using a computer is called a what?
- 12. A form of testing a network, database, firewall, etc.
- 14. A way into a system without having to go through the standard protocols.
- 17. A kind of software that looks like the real software you are trying to download, however is actually malware.
- 18. A kind of rule that is usually made up the government to try and keep the peace (for the most part).