My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cyber Crime Terms

Across
A point of entry that circumvents normal security
A malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems
Unsolicited email, also known as junk email
These are the bad guys.
A non-malicious surprise contained in a program or on a circuit board installed by the developer.
The catch-all term used when in fact it should be “cracker.”
A small packet of information from a visited webserver stored on your system by your computer’s browser
The program a black hat cracker uses to remotely transmit commands to infected zombie drones
To deceive someone for the purpose of acquiring sensitive and personal information, like credit card details or user names and passwords.
Ethical hackers. They use their knowledge and skill to thwart the black
A malicious program designed to execute at a predetermined time and/or date
The part of the malware program that actually executes its designed task.
A form of social engineering carried out by black hats in electronic form, usually by email, with the purpose of gathering sensitive information
A malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there.
A white hat/black hat hybrid
A malware program that can be used by a black hat cracker to remotely take control of a system
Down
An attack designed to overwhelm a targeted website to the point of crashing it or making it inaccessible
Someone who breaks into a computer system or network without authorization and with the intention of doing damage
A non-destructive program that is designed to log every keystroke made on a computer.
The act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network.
A software “robot” that performs an extensive set of automated tasks on its own
Does not possess, or just doesn’t use, their own skills and know-how to hack or crack a computer system or network, but uses a pre-written program or piece of code, a script, to do the dirty work
Faking an IP address or masking/changing the sender information on an email so as to deceive the recipient as to its origin
Software designed to force pre-chosen ads to display on your system
Software designed to gather information about a user’s computer use without their knowledge
Rummaging through the trash of an individual or business to gather information that could be useful for a cyber criminal to gain access to a system
A security barrier designed to keep unwanted intruders “outside” a computer system or network
A malware program that is installed on a system through various means, including the same methods that allow viruses to be injected into a system
A network of zombie drones under the control of a black hat
Done with the help of zombie drones (also known as a botnet) under the control of black hats using a master program
Similar to a virus in that it is a destructive self-contained program that can replicate itself.