1:00
en
CR
Hackers and Hacking
15
Hacker:Somebody who try to take our access data from others computer.
Break In:When somebody try to gain access to something they are unauthorized.
Computer System:Somewhere where you store data or make files and get to computer programs.
Steal:Try to take something that isn't yours.
Firewall:A system to stop unauthorized access to or from a unknown or private network.
Audit log:An action used to track whatever a user is doing on a network. This could be from what time they logged on to even what key's they used on a keyboard.
Data:Unique pieces of information.
Illegal:Something that is not allowed by the law.
Password:A key used to make sure other's can't use or access your computer or account.
Encrypt: To encode something.
Prison:Somewhere where criminal's are put in for committing to crime's.
Poor security:When something is not being protected or kept safe properly.
Username:The name to log on to an account or computer.
Physical protection:When needing to protect yourself from harm if somebody is showing violence towards you.
Software protection:Something to protect your software, stop your files being stolen or bank account's being hacked.
Hackers and Hacking
Across:1. | When something is not being protected or kept safe properly. | 2. | Something to protect your software, stop your files being stolen or bank account's being hacked. | 6. | Unique pieces of information. | 10. | When somebody try to gain access to something they are unauthorized. |
| 11. | A system to stop unauthorized access to or from a unknown or private network. | 12. | Something that is not allowed by the law. | 14. | To encode something. |
| | Down:1. | When needing to protect yourself from harm if somebody is showing violence towards you. | 3. | Somewhere where you store data or make files and get to computer programs. | 4. | The name to log on to an account or computer. | 5. | Try to take something that isn't yours. |
| 7. | Somewhere where criminal's are put in for committing to crime's. | 8. | A key used to make sure other's can't use or access your computer or account. | 9. | Somebody who try to take our access data from others computer. | 13. | An action used to track whatever a user is doing on a network. This could be from what time they logged on to even what key's they used on a keyboard. |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only
Hackers and Hacking
Across:1. | When something is not being protected or kept safe properly. | 2. | Something to protect your software, stop your files being stolen or bank account's being hacked. | 6. | Unique pieces of information. | 10. | When somebody try to gain access to something they are unauthorized. |
| 11. | A system to stop unauthorized access to or from a unknown or private network. | 12. | Something that is not allowed by the law. | 14. | To encode something. |
| | Down:1. | When needing to protect yourself from harm if somebody is showing violence towards you. | 3. | Somewhere where you store data or make files and get to computer programs. | 4. | The name to log on to an account or computer. | 5. | Try to take something that isn't yours. |
| 7. | Somewhere where criminal's are put in for committing to crime's. | 8. | A key used to make sure other's can't use or access your computer or account. | 9. | Somebody who try to take our access data from others computer. | 13. | An action used to track whatever a user is doing on a network. This could be from what time they logged on to even what key's they used on a keyboard. |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only