DTIN - Digital Security

12345678910111213141516171819202122232425262728293031323334
Across
  1. 5. Significant increase in electrical power.
  2. 7. Rules of an online community.
  3. 9. Unwanted electrical signal.
  4. 12. Process of encoding information to protect it from unauthorized access.
  5. 15. Protects the use of original works.
  6. 16. Disrupts computer access to an Internet service.
  7. 21. An event causing loss or damage to computer hardware, software, data, or processing capability.
  8. 23. Protects computer and equipment from electrical power disturbances.
  9. 26. A group of compromised computers connected to a network.
  10. 29. Steps to be taken immediately after a disaster.
  11. 31. Use of digital communication tools to harm or harass others.
  12. 32. Simulates disasters and records recovery ability.
  13. 33. A type of malware that copies itself repeatedly.
  14. 34. Software developed to detect and remove computer viruses.
Down
  1. 1. Measures to protect information from unauthorized access.
  2. 2. Licenses that allow creators to communicate which rights they reserve.
  3. 3. A compromised computer or device.
  4. 4. Larger scale of a DoS attack.
  5. 6. Specific pattern of virus code.
  6. 8. Drop in electrical supply.
  7. 10. Prolonged malfunction of a computer.
  8. 11. Process used by antivirus programs to prevent infection.
  9. 13. Malware that hides within or looks like legitimate software.
  10. 14. Actions to restore full information processing operations.
  11. 17. Separating infected files that cannot be removed.
  12. 18. Online or Internet-based illegal act.
  13. 19. Program that protects your computer from unauthorized access.
  14. 20. Attempts to disrupt or gain unauthorized access to computer networks.
  15. 22. Surge protector that provides power during power loss.
  16. 24. Fraudulent attempt to obtain sensitive information.
  17. 25. A potentially damaging computer program.
  18. 26. Program that allows users to bypass security controls.
  19. 27. Allows limited use of copyrighted material without permission.
  20. 28. How backup files and equipment resume information processing.
  21. 30. Malicious software designed to harm or exploit any programmable device or network.