Across
- 2. Exception to copyright infringement.
- 4. A network controller which connects devices and allows effective communication between these devices.
- 5. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 6. collection of computers controlled by users other than their own to perform automated tasks over the internet.
- 7. is being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet.
- 8. A device which monitors network activities for attacks and produces reports to a management station.
- 9. is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
- 11. Granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production.
- 12. Forwarding or distribution of a message which includes sexually explicit materials
- 15. Unauthorized reproduction or distribution of copyright materials.
- 16. Someone who is an expert at fixing and preparing computers, but they can also illegally gain access to other people's computers for their own profits.
- 17. Computer device which forwards data packets from one network to another.
- 19. Fraud which involves stealing personal information for financial gain through email.
- 20. Use of other peoples words, thoughts or ideas without crediting the source.
- 22. use of computers or other electronic device to purposely harm another person online.
- 23. “crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?”
- 24. Security component which encrypts data and keeps it private within a public network.
Down
- 1. Ownership of any creative work or invention.
- 3. Method through which hackers can gain access to a computer.
- 10. An internet user, who uses sites, chat rooms, or other cyberspace to hurt people for sexual or abusive purposes.
- 13. is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
- 14. Software designed to protect computers from viruses.
- 18. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- 19. messages distributed by electronic means from one computer user to one or more recipients via a network.
- 21. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 25. a secret word or phrase that must be used to gain admission to something.