LEARNING UNIT 2 - Protecting information Resources

1234567891011
Across
  1. 7. a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
  2. 9. is a business plan that describes how work can be resumed quickly and effectively after a disaster.
  3. 10. is a malicious individual or group who scam users. They do so by sending e-mails or creating web pages designed to collect an individual's online bank, credit card, or other login information. Because these e-mails and web pages look legitimate, users trust them and enter their personal information.
  4. 11. Which type of access control is used to protect systems from unauthorized access?
Down
  1. 1. software runs hidden in the background, making a note of each keystroke you type. Software could scan through the file for certain types of text — for example, it could look for sequences of numbers that look like credit card numbers and upload them to a malicious server so they can be abused.
  2. 2. is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  3. 3. is designed from the ground up for reliability by building multiples of all critical components, such as CPUs, memories, disks and power supplies into the same computer.
  4. 4. is the use of biometric data for identification, access control, and authentication.
  5. 5. is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
  6. 6. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
  7. 8. is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.