Jair Jesus Capitan Cortes

12345678910111213
Across
  1. 2. Also known as junk mail, is unsolicited e-mail.
  2. 3. A form of attack that prevents users from accessing normal services, such as e-mail and a web server.
  3. 5. Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  4. 10. Should be fully erased to prevent the possibility of recovery using specialized software.
  5. 11. Is a program written with malicious intent and sent out by attackers.
  6. 12. Is a software program that displays advertising on your computer.
  7. 13. Is a file or program other then a virus that is potentially harmful.
Down
  1. 1. Is the protocol suite that is used to control all of the communications on the Internet.
  2. 2. A __________ engineer is a person who is able to gain access to equipment.
  3. 4. Is similar to adware.
  4. 6. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring.
  5. 7. Technically a worm.
  6. 8. Programming language that allows applets to run within a web browser.
  7. 9. Is a self-replicating program that is harmful to networks.
  8. 10. Destruction is the process of removing sensitive data from hardware and software before recycling or discarding.