Chapter 05 Part 06 Crossword

12345678910111213141516
Across
  1. 5. a what is a program or set of instructions in a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
  2. 7. an object is any item that must be carried to gain access to a computer or computer facility
  3. 9. a what is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer devices
  4. 10. involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks
  5. 11. along with worms, and Trojan horses deliver their what on a computer or mobile devices when a user opens an infected file or runs an infected program
  6. 14. the what act gives law enforcement the right to monitor people's activities, including web and email habits
  7. 15. is the unauthorized and illegal duplication
  8. 16. a what device authenticates a person's identity by translating a personal characteristic in a a digital code
Down
  1. 1. the term what describes an attack whose goal ranges from disabling a government's computer network to crippling a country
  2. 2. a what control is a security measure that defines who can access a computer
  3. 3. occurs when someone steals personal or confidential information
  4. 4. is the process of converting readable data into unreadable characters to prevent unauthorized access
  5. 6. a what is a web app that evaluates you computer or mobile device to check for Internet and email vulnerabilities
  6. 8. a what attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email
  7. 12. signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
  8. 13. an agreement is the right to use software