Security Vocabulary

12345678910111213141516
Across
  1. 5. The malicious practice of manipulating a website user's activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.
  2. 6. Predator Adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
  3. 8. Use a computer to gain unauthorized access to data in a system.
  4. 9. Ware A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. 10. The loss of, unauthorized access to, or disclosure of, personal information.
  6. 12. A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  7. 14. The correct or acceptable way of communicating on the Internet.
  8. 15. Imitate fraudulently.
Down
  1. 1. privacy The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
  2. 2. Creating Malware Computer programs designed to infiltrate and damage computers without the users consent.
  3. 3. Online piracy and includes the unauthorized online distribution of electronic copies of copyrighted material such as software, etc.
  4. 4. attacks The perpetrator seeks to make a machine or network resource unavailable.
  5. 7. A situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
  6. 11. The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
  7. 13. The illegal copying, distribution, or use of software.
  8. 16. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.