|
"Network Secruity ": HTML5 Crossword |
Across1. unsolicited bulk email, junk mail, or unsolicited commercial email (4)
4. wrongful or criminal deception intended to result in financial or personal gain (5)
7. The umbrella term for software that learns a computer (7)
8. small files which are stored on a user's computer (7)
9. any skilled computer expert that uses their technical knowledge to overcome a problem (6)
12. A overload on a server or website (3,6)
14. a person who hacks into a computer network in order to test or evaluate its security systems (9)
16. a system designed to prevent unauthorized access to or from a private network (8)
17. The translation of data into a secret code (10)
18. The permissions that are granted to a user, or to an application, to read, write and erase files in the computer (12)
19. action of recording the keys struck on a keyboard (9)
|
|
Down1. software that gathers information from your computer and sends it back to the author (7)
2. the unauthorized use or reproduction of another's work (6)
3. standalone malware computer program that replicates itself in order to spread to other computers (4)
5. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer (8)
6. a person who hacks into a computer network with malicious or criminal intent (8)
10. programs that are designed to display advertisements on your computer (6)
11. secretly listen to a conversation (13)
13. a scamming practice in which malicious code is installed on a user’s computer (8)
15. a system that traces the detailed transactions relating to any item in an accounting record (10)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
1. unsolicited bulk email, junk mail, or unsolicited commercial email (4)
4. wrongful or criminal deception intended to result in financial or personal gain (5)
7. The umbrella term for software that learns a computer (7)
8. small files which are stored on a user's computer (7)
9. any skilled computer expert that uses their technical knowledge to overcome a problem (6)
12. A overload on a server or website (3,6)
14. a person who hacks into a computer network in order to test or evaluate its security systems (9)
16. a system designed to prevent unauthorized access to or from a private network (8)
17. The translation of data into a secret code (10)
18. The permissions that are granted to a user, or to an application, to read, write and erase files in the computer (12)
19. action of recording the keys struck on a keyboard (9)
DOWN
1. software that gathers information from your computer and sends it back to the author (7)
2. the unauthorized use or reproduction of another's work (6)
3. standalone malware computer program that replicates itself in order to spread to other computers (4)
5. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer (8)
6. a person who hacks into a computer network with malicious or criminal intent (8)
10. programs that are designed to display advertisements on your computer (6)
11. secretly listen to a conversation (13)
13. a scamming practice in which malicious code is installed on a user’s computer (8)
15. a system that traces the detailed transactions relating to any item in an accounting record (10)

|