Chapter 12 Vocab
Across
- 4. technology that uses physical characteristics to authenticate
- 6. the most popular asymmetric encryption
- 7. a feature that follows instructions from a special file when new media is inserted
- 8. a LAN that uses radio waves to transmit data between wireless data
- 10. a feature that can be used to encrypt data
- 11. a attack that uses multiple computers to create a large amount of requests to a network server
- 13. a type of malware that records every keystroke made by a user
- 16. the set of rules that governs the delivery of data over a network
- 17. the most popular hashing algorithm
- 18. a feature that allows new media to connect to the computer easily
- 19. a type of hardware that allows connections to peripherals without effort
- 24. a cheat or loophole
- 25. a limited type of text that is at the most basic form
- 26. a old function that takes a message and makes it 128 bits long
- 30. a protocol for receiving email by downloading it from a computer
- 31. a company that provides internet security and has a red color
- 32. a subnetwork that provides services to an untrusted network
Down
- 1. a malware that breaches the security of a computer that appears harmless
- 2. a feature that allows you to encrypt an entire hard drive
- 3. a company that deals with online security
- 5. a person that breaks into code and firewalls with malicious intent
- 9. data that is transmitted or stored without an encryption
- 12. a Windows module that is also used for administration of system settings
- 14. a type of computer made from Lenovo
- 15. a request that is the initial communication to establish a TCP connection
- 20. a company that provides internet security and has a green color
- 21. a protocol that enables devices to add themselves into a network without user interaction
- 22. a malware that replicates itself so it can spread to other computers
- 23. a computer company that made the ThinkPad
- 27. a service that translates URLs to IP addresses that can be exploited to make directions imposter servers
- 28. a MMC file with tools used to create automatic tasks
- 29. the use of radio waves to real and capture data on a tag on hardware
- 31. a type of attack that intercepts data transfer through a network