The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Internet Security Terms


Name ______________________________

Period _____________________________

Date ______________________________

Across
This is access to a computer program that bypasses security mechanisms.
Software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
This provides a way for the Website to recognize you and keep track of your preferences. This could be a way of storing your personal information.
Copy (data) from one computer system to another, typically over the Internet.
The adding of a password to a file to ensure that only the person with password can view the file
A computer that is connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
This is a crime where a criminal steals things such as money or information online.
This is software that spreads from computer to computer and has the capability to travel without any human action. It takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
This is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.
This is a computer security system designed to prevent unauthorized access.
This is software that is designed to detect and destroy computer viruses.
The correct or acceptable way of communicating on the Internet.
Down
a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer
This is software that automatically displays or downloads advertising material when a user is online.
Software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
A software or operating-system patch that is intended to correct a vulnerability to hacking or viral infection.
Data storage refers to the practice of storing electronic data with a third party service accessed via the Internet.
This is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
A person who uses computers to gain unauthorized access to data.