The document consists of crossword clues related to cybersecurity terms and concepts. It includes definitions for terms such as malware, encryption, and unauthorized access. Each clue corresponds to a specific word relevant to information security.
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
1. Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private
combination of characters associated with the user destroyed name 4. Unauthorized and illegal
duplication of copyrighted software 3. Demands payment to stop an attack on an organization's
5. Useful to record, save, and execute keystrokes and instructions technology infrastructure
repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a
repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up
window on 9. Private combination of words associated with a user name webpages 10.
Compromised computers connected to a network and used to 8. Program that copies itself
repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file
that a web server stores on your computer 13. Technique used to make network or Internet
transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16.
Compromised computer or device 15. The encrypted (scrambled) data in the encryption process
17. Program that hides in a computer and allows someone to take control of it 18. Destructive
event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the
encryption process