CompSci
Across
- 3. Gathering info abt computer systems before it is attacked
- 4. Type of attack that uses a computer program to generate all combinations of characters until it finds the combination that matches the password
- 8. Illegal copying of software of data
- 10. Type of attack that comes from a network of distributed computer systems
- 11. Something to swap tasks in and out of the processor to appear that the computer is multitasking
- 13. Gives user special access
- 14. Gives user no restriction to the software
- 17. Credit must be given to author
- 19. Prevents malicious traffic from entering the network
- 20. Encrypts the IP address to hide it
Down
- 1. Devices not allowed to connect to network
- 2. Protects original work
- 5. Protects indication of commercial source
- 6. Protects ideas
- 7. Program that controls the operation of a specific type of device that is a part of the computer system
- 9. Allows the user to interact with the system by typing in specific commands
- 12. Type of attack that uses a list of passwords to check if the password that is being cracked matches a password in the list
- 15. Short of robot network, a network of computers under control of a single operator
- 16. Fooling biometric scanners
- 18. Language that is used to form queries to extract or manipulate information in a database