IC3 Lesson 30

12345678910111213
Across
  1. 3. Security feature used for larger networks that controls computers from one point
  2. 4. A malicious program that records keystrokes
  3. 5. Hackers using spyware to control your browser
  4. 7. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  5. 9. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  6. 12. Encrypts the information in an SSL Certificate
  7. 13. Invading Someone else's computer, usually for personal gain or the satisfaction of defeating a security system
Down
  1. 1. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  2. 2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. 6. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
  4. 8. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  5. 10. Deciphers the information in an SSL Certificate
  6. 11. A program that hackers use to capture IDs and passwords on a network