Answer:
Step-by-step explanation:
1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)
2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)
3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)
4. A software program specifically designed for computer forensic investigations - (EnCase)
5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)
6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)
7. Malicious software similar to a computer virus -- (_worm)
8. Federal legislation aimed specifically at computer crime (CFAA)