IC3 Lesson 30

12345678910111213
Across
  1. 1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. 5. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  3. 6. Deciphers the information in an SSL Certificate.
  4. 8. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  5. 10. Hackers using spyware to control your browser.
  6. 13. Security feature used for larger networks that controls computers from one point.
Down
  1. 2. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. 3. Encrypts the information in an SSL Certificate.
  3. 4. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  4. 7. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  5. 9. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  6. 11. A malicious program that records keystrokes.
  7. 12. A program that hackers use to capture IDs and passwords on a network.