Across
- 4. A type of Malware that locates and saves data from users without them knowing about it
- 5. Hat Hacking hackers penetrate security to test it, and inform the institution of vulnerabilities they find without exploiting them. This does not break IT security laws.
- 6. Software that encrypts programs and data until a ransom is paid to remove it.
- 7. Program that hides in a computer and allows someone from a remote location to take full control of the computer.
- 9. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- 10. Unauthorized access, modification, or use of an electronic device or some element of a computer system.
- 12. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems.
- 14. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- 15. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- 1. Criminals make a promise of goods in return for details, such as offering a free music download.
- 2. When someone deceives by pretending to be someone else in order to get personal data.
- 3. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
- 8. surfing Watching an authorized user enter a security code on a keypad.
- 11. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
- 13. A destructive computer program that bores its way through a computer's files or through a computer's network
