My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Internet Security Terms

Across
This is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.
This is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
This provides a way for the Website to recognize you and keep track of your preferences. This could be a way of storing your personal information.
A computer that is connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
A person who uses computers to gain unauthorized access to data.
This is a computer security system designed to prevent unauthorized access.
The correct or acceptable way of communicating on the Internet.
Software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
Down
a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer
This is access to a computer program that bypasses security mechanisms.
Data storage refers to the practice of storing electronic data with a third party service accessed via the Internet.
A software or operating-system patch that is intended to correct a vulnerability to hacking or viral infection.
This is software that spreads from computer to computer and has the capability to travel without any human action. It takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The adding of a password to a file to ensure that only the person with password can view the file
This is a crime where a criminal steals things such as money or information online.
Copy (data) from one computer system to another, typically over the Internet.
This is software that is designed to detect and destroy computer viruses.
This is software that automatically displays or downloads advertising material when a user is online.
Software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.