Chapman University - NCSAM week 3
Across
- 3. Software designed to detect and destroy computer viruses.
- 5. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- 8. A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
- 9. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
- 1. A means of access to a computer program that bypasses security mechanisms.
- 2. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 4. A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
- 5. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- 6. A hole in software that is unknown to the vendor and that hackers can exploit.
- 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.