IC3 Module 3 Lesson 30

12345678910111213
Across
  1. 3. Encrypts the information in an SSL Certificate.
  2. 4. Security feature used for larger networks that controls computers from one point.
  3. 5. A malicious program that records keystrokes.
  4. 8. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  5. 9. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  6. 10. Deciphers the information in an SSL Certificate.
  7. 12. Hackers using spyware to control your browser.
  8. 13. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Down
  1. 1. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  2. 2. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  3. 6. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  4. 7. A program that hackers use to capture IDs and passwords on a network.
  5. 11. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.