Across
- 5. unauthorized reproduction or distribution of copyrighted materials, information or production
- 6. Scam fraud which involves stealing personal information for financial gain through e-mail
- 7. Private Network security component which encrypts data and keeps it private within a public network
- 11. Predator adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or other abusive purposes
- 13. collection of computers controlled by users other than their owners to perform automated tasks over the Internet
- 14. Switch network controller which connects network devices and allows effective communication between these devices
- 15. computer device which forwards data packets from one network to another
- 17. Engineering Vector method through which hackers can gain access to a computer
Down
- 1. Detection System device which monitors network activities for malicious attacks and produces reports to a management station
- 2. use of other people’s words, thoughts or ideas without crediting the source
- 3. software designed to protect computers from viruses
- 4. use of computers,cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
- 8. Virus computer program which replicates and spreads itself from one computer to another
- 9. Property ownership of any creative work or invention
- 10. Theft crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain
- 12. originally refers to someone who is an expert at computer programming and who is able to solve computer problems, but also means someone who illegally gains access to others’ computer for their own profits
- 16. granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
