Across
- 1. Ensuring consistent access to the system, services, and data whenever necessary.
- 7. first made to use idle computer resources but were later misused for harm, spreading by copying themselves to other computers.
- 8. Hacking started to have a bad meaning during the late 1970s to 1990s
- 9. typically viewed as a criminal act where people break into computer systems to release viruses and steal important data.
- 11. involves using hacking techniques to further a political agenda or promote a specific cause.
- 13. tricks your browser into visiting fake sites that steal your info by messing with DNS records.
- 15. Maintaining data accuracy by preventing unauthorized changes and ensuring it stays consistent and aligned with real-world information.
- 16. Hacking was considered a good thing in the time periods of the 1960s and 1970s
- 17. a key security tool, wasn't initially incorporated into the core Internet protocol TCP/IP due to the high cost of computing power required. Additionally, securely sharing decryption keys presented a significant challenge at that time.
- 18. Safeguarding private data to ensure it stays protected.
- 19. tricks people into giving up information or breaking security rules
Down
- 2. is software that latches onto programs, duplicates itself, and can carry out tasks like deleting files or sending emails. It spreads when people use infected programs or open compromised attachments.
- 3. is a secret way into a device that avoids its usual security checks. Hackers use it to access systems later, while developers might create one for easy system access or to gather user data.
- 4. sneaky malware pretending to be safe software. People unknowingly run it, thinking it's harmless, but it secretly performs bad actions like installing viruses or sending spam.
- 5. is a hacker's network of infected devices, controlled from a central server. These compromised devices, or bots, perform tasks like spamming or cyberattacks, acting as the hacker's directed team.
- 6. locks files, demands untraceable payment, and led to around 4000 daily attacks in 2016, with millions paid to hackers, as reported by the U.S. Department of Justice.
- 10. are unique biological traits like fingerprints, voice patterns, and DNA, distinguishing one person from another. DNA is commonly used in law enforcement for identification purposes
- 12. quietly watches devices, stealing data by logging keystrokes and tracking online actions. It can also secretly control webcams, sending info to hackers without users knowing.
- 13. cams that use fake messages to trick people into sharing personal information by clicking on false website links, often using fake security alerts as a lure for fraud.
- 14. What was the computer program that found a big vulnerability of the internet due to hacking
- 17. 1990s through present day, e-commerce
