fundamental securiy

12345678910111213141516171819
Across
  1. 1. uses zombies to make tracking the origins of the DoS attack more difficult to locate
  2. 4. data being transported on a network
  3. 6. a data file containing known characterstics of an individual
  4. 7. changes to the DNS records on a system to point to false servers where data is recorded
  5. 10. compares physical characteristics against stored profiles to authenticate people
  6. 16. technology created by Microsoft to control interactivity on web pages
  7. 17. a software program that displayes advertising on your computer
  8. 18. a file or program other then a virus that is potentially harmful
  9. 19. also known as secure erase
Down
  1. 1. denial of service
  2. 2. a comprehensive update application containing patches and upgrades by the manufacturer
  3. 3. code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  4. 5. gains access to resources and devices by pretending to be a trusted computer
  5. 8. events or attacks that steal, damage, or destroy equipment
  6. 9. form of attack that uses many infected computer to launch an attack
  7. 11. a worm that doesn't need to be attached to other software
  8. 12. a program that runs on a computer to allow or deny traffic between the computer and the network
  9. 13. programming language that allows applets to run within a web browser
  10. 14. a program written with malicious intent and sent out by attackers
  11. 15. network sniffers used to exact usernames and passwords to be used at a later date