PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
 

Username:    
Password:    
Submit Cancel

 

Not a member?

JOIN NOW!

 
                                     
                             
                                   
                           
                                   
                 
                             
                                 
                           
                     
                                   
           
                                 
                   
                                 
                 
                                 
                         
                       
                                     

"S3CL Ch6 Internet Security": HTML5 Crossword

Across

2. Old versions of software could be ______ to virus attacks. (5)
4. It will damage the data on the computer and infect other programs as well. (5)
5. Short form for malicious software. (7)
6. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
7. A malware that can replicate themselves and spread through computer networks automatically. (4)
9. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
10. Unlike computer viruses, Trojan horses do not ________ themselves. (9)
12. It takes place when an Internet user is threatened, harassed, or embarrassed by another Internet user. (13)
13. Most __________ systems nowadays include firewall software. (9)
14. Turn on the auto-update function of anti-virus software to update the virus __________. (9)
15. Trojan hourse allows the _______ to infiltrate the computer system. (6)
16. Anti-virus software scans running applications so viruses can be _______ and removed immediately. (8)

Down

1. ________ engineering means manipulating other people in order to gain confidential information from the victims. (6)
3. A software or hardware device that can monitor and control network traffic. (8)
6. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
8. Victims are told a convincing story and persuaded to provide their personal information or to transfer their money. (10)
9. A set of conventions governing people's behaviour in an online environment. (10)
11. Hackers may use security __________ in the older versions of operating systems to damage our devices. (9)

new edit share pdf:puzzle pdf:answers Create an editable copy