Across
- 4. the process of returning a system back to a state of normalcy.
- 6. a type of malware that functions by spying on user activity without their knowledge.
- 9. the act of illegally copying software, music, or movies that are copyright-protected
- 11. a social engineering attack that attempts to collect information from victims.
- 13. a computer system that resides on a network and can independently communicate with other systems on the network
- 14. a person who hacks telephone systems, usually for the purpose of making free phone calls
- 15. a program used to access the Internet.
- 18. a person who combines phone phreaking with computer hacking
- 19. a group of computers that is linked to share data and other information.
- 20. the act which transforms plaintext or cleartext into ciphertext
- 21. group of computers, printers and devices that are interconnected and governed as a whole.
- 25. an online journal. Contraction of the term “web log.”
- 26. the interception of electronic communications in order to access information
- 28. crime related to technology, computers, and the Internet
- 29. a device designed to enforce the boundary between two or more networks, limiting access
- 30. an information packet sent from a website to a web browser that records a user’s activity on that website.
- 32. the process of protecting information or hiding its meaning by converting it into a code
- 34. the process of converting encrypted information back into normal, understandable text
- 37. unsolicited commercial email
- 38. an audio or video clip that has been edited and manipulated to seem real or believable.
- 40. the process of disguising one computer user as another
- 41. a malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 44. refers to any piece of software or application that displays advertisements on your computer.
- 46. the use of a computer user's unique physical characteristics
- 47. a computer program that copies itself across a network
Down
- 1. a type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 2. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 3. protecting information or hiding its meaning by converting it into a secret code
- 5. a program designed to capture information across a computer network
- 7. a trap or decoy for attackers.
- 8. an error or mistake in software coding or hardware design or construction.
- 10. a data string used to verify the identity of a user
- 12. process of bypassing the security systems on a computer system or network
- 15. to make a copy of data stored on a computer or server to reduce the potential impact of failure or loss
- 16. another kind of malware that allows cybercriminals to remotely control your computer.
- 17. the process of trying to overcome a security measure
- 22. an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
- 23. a term sometimes used to describe a person who pursues knowledge of computer and security systems for its own sake
- 24. data that has been encrypted
- 25. a security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- 27. an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later
- 28. a technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 31. a flaw in a security device
- 33. a computer network that uses the Internet protocol family
- 35. an application that allows the sending of messages between computer users via a network
- 36. a discrete block of data sent over a network
- 39. a set of programs that tell a computer to perform a task.
- 42. slang for pirated software
- 43. the proper term to refer to an unauthorized attacker of computers, networks and technology
- 45. a computer program designed to make copies of itself and spread itself from one machine to another without the help of the user
