My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Chapter 5 – Protecting Information Resources

Horizontales
directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
monitor and record keystrokes and can be software or hardware devices.
Verticales
software that secretly gathers information about users while they browse the Web.
sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize.
a form of spyware that collects information about the user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.