The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

ACC 272 Chapter 6

Teacher: Rebecca Brown
Across
Any software that can be used to do harm.
Similar to a virus, except that it is a program rather than a code segment hidden in a host program. It also copies itself automatically and actively transmits itself directly to other systems.
Attacking phone systems to obtain free phone line access or using phone line to transmit viruses to access, steal, and destroy data.
_____ theft is assuming someone's ____, usually for economic gain, by illegally obtaining and using confidential information, such as SS number or a bank account or credit card number. (Same word, used twice.)
Unauthorized use of special system programs to bypass regular system controls and perform illegal acts, all without leaving an audit trail.
____ horse is a set of malicious computer instructions in an authorized and otherwise properly functioning program. Unlike viruses and worms, the code does not try to replace itself.
Internet ____ fraud is using an Internet auction site to defraud another person.
Software ____ is the unauthorized copying or distribution of copyrighted software.
Password _____ is penetrating a system's defenses, stealing the file containing valued passwords, decrypting them, and using them to gain access to programs, files, and data.
Combination of spam and blog with links to Web sites they own to increase activity.
Down
E-mailing or texting an unsolicited message to many people at the same time…
____ dialing is programming a computer to dial thousands of phone lines searching for dial-up modem lines.
Social _____ refers to techniques or psychological tricks used to get people to comply with the perpetrator's wishes in order to gain physical or logical access to a building, computer server, or network…
Sending an electronic message pretending to be a legitimate company and requesting information or verification of information.
Software secretly monitors and collects personal information about users and sends it to someone else.
Making an electronic communication look as if someone else sent it to gain the trust of the recipient.
Code released by software developers that fixes a particular vulnerability.
Spyware that pops banner ads on a monitor, collects information about the user's Web-surfing and spending habits, and forwards it to the adware creator.
Unauthorized access, modification, or use of an electronic device or some element of a computer system.