Chapter 5 part 6

123456789101112131415161718
Across
  1. 1. Most common type of license agreement.
  2. 7. An attack whose purpose is to disrupt internet service.
  3. 9. Security measure that defines who can access a computer.
  4. 11. The examination of media, programs, data, and log files on computer systems.
  5. 14. An attack with the goal to disable a government's computer network.
  6. 17. Outline of activities that are prohibited and permitted on a network.
  7. 18. Program that hides in a computer or mobile device and allows someone to remotely control it.
Down
  1. 1. Process of converting data into unreadable characters to prevent unauthorized access.
  2. 2. Web app that evaluates your computer to check for vulnerabilities.
  3. 3. Type of device that requires a personal characteristic to authenticate a user.
  4. 4. Wireless network name.
  5. 5. Written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
  6. 6. Computer viruses like worms and Trojan horses delivers this.
  7. 8. Unauthorized and illegal duplication of copyrighted software.
  8. 10. This occurs when someone steals personal or confidential information.
  9. 12. Any item that must be carried to gain access to a computer.
  10. 13. Encryption code that a person, website, or organization attaches to an email to verify the identity of the sender.
  11. 15. Right to use the software.
  12. 16. Program in or set of instructions to bypass security controls.