2105 - Chapter - 4
Across
- 4. is an act or object that poses a danger to assets.
- 7. is the legal protection afforded an expression of an idea, such as a song, book, or video game.
- 8. monitoring policy stating explicitly how, when, and where the company
- 10. is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
- 11. is the assurance that messages and information remain available only to those authorized to view them.
- 13. scrambles information into an alternative form that requires a key or password to decrypt.
- 14. security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
- 15. includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website.
- 17. requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
- 21. is the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space
- 22. is a program that secretly takes over another computer for the purpose of launching attacks on other computers
Down
- 1. refers to a period of time when a system is unavailable
- 2. is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor
- 3. software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
- 5. is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them
- 6. is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals
- 9. is a method for confirming users' identities
- 12. is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
- 13. the principles and standards that guide our behavior toward other people
- 16. reroutes requests for legitimate websites to false websites.
- 18. is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
- 19. software is software that is manufactured to look like the real thing and sold as such
- 20. is a form of social engineering in which one individual lies to obtain confidential data about another individual.