any software program in which advertising banners are displayed while the program is running.
Adware
designed to detect and destroy computer viruses.
Antivirus
an attempt by hackers to damage or destroy a computer network or system.
Attack
a method, often secret, of bypassing normal authentication in a product
back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
bots
are small files that Web sites put on your computer hard disk drive when you first visit
cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
firewall
someone who seeks and exploits weaknesses in a computer system or computer network.
hacker
global system of interconnected computer networks that use the Internet protocol suite
internet
a local or restricted communications network, especially a private network created using World Wide Web software.
intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent
trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
virus
a standalone malware computer program that replicates itself in order to spread to other computers.
worm

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Chapter 11

24 terms
Created on May 3, 2016

technology

20 terms
Created on May 17, 2016

will

20 terms
Created on Jun 13, 2016

OnGuardians

15 terms
Created on Jun 16, 2016

Review of digital literacy unit

20 terms
Created on Jun 16, 2016

Computer Terms

15 terms
Created on Jun 16, 2016

Review of digital literacy unit

15 terms
Created on Jun 16, 2016

BTT101

17 terms
Created on Jun 16, 2016

Ms. Etherington

15 terms
Created on Jun 16, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Computer Basics

20 terms
Created on Aug 12, 2016

Technology

26 terms
Created on Aug 12, 2016

Glossary Crossword

10 terms
Created on Sep 2, 2016

COM Crossword

20 terms
Created on Sep 23, 2016

Standard 7 Vocabulary

10 terms
Created on Oct 17, 2016

E-Safety

20 terms
Created on Nov 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017

Cyberbullying

21 terms
Created on Jan 30, 2017