Chapman University - NCSAM week 3

123456789
Across
  1. 3. Software designed to detect and destroy computer viruses.
  2. 5. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  3. 8. A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
  4. 9. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
  1. 1. A means of access to a computer program that bypasses security mechanisms.
  2. 2. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. 4. A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
  4. 5. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. 6. A hole in software that is unknown to the vendor and that hackers can exploit.
  6. 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.