Chapter 5 Part 6

12345678910111213141516171819
Across
  1. 2. What is a written plan that describes the steps in an organization would take to restore its computer operations in the event of a disaster?\
  2. 4. What involves the examination of media, programs, data and logs files on computers, mobile devices, services, and networks?
  3. 5. What outlines the activities for which a computer or network may and may not be used?
  4. 11. What object is any item that must be carried to gain access to a computer or computer facility?
  5. 12. What signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender?
  6. 13. What is the process of converting readable data into unreadable characters to prevent unauthorized access?
  7. 15. What is the unauthorized and illegal duplication of copyrighted software?
  8. 16. What describes an attack whose goal ranges from disabling a goverment's computer network to crippling a country?
  9. 18. What agreement is the right to use software?
  10. 19. What is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices?
Down
  1. 1. What is an assault whose purpose is to disrupt computer access to an Internet service such as web or email?
  2. 3. What is the most common type of license included with software purchased by individual users?
  3. 6. What occurs when someone steals personal or confidential information?
  4. 7. What is a web app that evaluates your computer or mobile device to check for internet and email vulnerabilities?
  5. 8. What control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer?
  6. 9. What delivers a way of infectious code once the infected file is launched?
  7. 10. What type of device authenticates a person's identity by translating a person characteristic into digital code that then is compared with digital code stored in the computer verifying a physical or behavioral characteristic?
  8. 14. What is a wireless network name, which you should change from default to something that uniquely identifies your network?
  9. 17. What is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network?