Across
- 2. A device which monitors network activities for attacks and produces reports to a management station
- 7. the process of rearranging the data on a storage medium, such as a hard disk drive (HDD), for efficient storage and access.
- 8. Someone who is an expert at fixing and preparing computers, but they can also illegally gain access to other people's computers for their own profits.
- 9. A network controller which connects devices and allows effective communication between these devices.
- 13. An internet user, who uses sites, chat rooms, or other cyberspace to hurt people for sexual or abusive purposes.
- 17. used by software developers and proprietary software companies to prevent the unauthorized copying of their software.
- 20. malware, that spreads between computers and causes damage to data and software.
- 21. collection of computers controlled by users other than their own to perform automated tasks over the internet.
- 24. Fraud which involves stealing personal information for financial gain through email.
- 25. Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Down
- 1. Software designed to protect computers from viruses.
- 3. a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
- 4. ownership of any creative work or invention
- 5. a security program designed to prevent, detect, search and remove types of malware from computers, networks and other devices.
- 6. a word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
- 10. bad hackers
- 11. Exception to copyright infringement.
- 12. Computer device which forwards data packets from one network to another.
- 14. when a criminal uses someone else's personal information to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
- 15. use of computers cellphones or other electronics devices to harm another person through the internet
- 16. good hackers
- 18. the practice of taking someone else's work or ideas and passing them off as one's own.
- 19. a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.
- 22. A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
- 23. Unauthorized reproduction or distribution of copyright materials.