fundamental securiy
Across
- 2. technology created by Microsoft to control interactivity on web pages
- 4. form of attack that uses many infected computer to launch an attack
- 5. uses zombies to make tracking the origins of the DoS attack more difficult to locate
- 7. network sniffers used to exact usernames and passwords to be used at a later date
- 8. denial of service
- 9. a program that runs on a computer to allow or deny traffic between the computer and the network
- 10. gains access to resources and devices by pretending to be a trusted computer
- 11. a program written with malicious intent and sent out by attackers
- 13. events or attacks that steal, damage, or destroy equipment
- 15. a worm that doesn't need to be attached to other software
- 17. a file or program other then a virus that is potentially harmful
- 18. a data file containing known characterstics of an individual
Down
- 1. compares physical characteristics against stored profiles to authenticate people
- 3. a software program that displayes advertising on your computer
- 6. also known as secure erase
- 8. changes to the DNS records on a system to point to false servers where data is recorded
- 10. a comprehensive update application containing patches and upgrades by the manufacturer
- 12. data being transported on a network
- 14. code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
- 16. programming language that allows applets to run within a web browser