Security 2

12345678910111213141516171819202122232425262728293031
Across
  1. 1. - Used by all software applications on a network system to identify the software application or service; numbers range from Oto 65,535.
  2. 3. - Written for the express purpose of modifying a computer's configuration or causing damage to a computer system.
  3. 4. - False message spread about a real or unreal virus: not actually a virus.
  4. 6. - Hardware device or software application that protects the computer from unauthorized access or malware delivered through a network or Internet connection.
  5. 7. - Virus created using a macro programming language, and it is attached to documents that use the language.
  6. 10. - Program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number.
  7. 11. - Designed to track a user's habits such as their web browsing habits.
  8. 16. - E-mail used to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source.
  9. 18. - Refers to a collection of malware that is not regarded as very dangerous, but rather more of a nuisance.
  10. 19. - Works with the Trusted Platform Module (TPM) to verify the successful launch of the operating system and store the information in the TPM.
  11. 20. - Attacks the master boot record (MBR) of a hard drive and is considered extremely destructive.
  12. 22. - Interception of a transmission over a network.
  13. 23. - Collection of infected computers controlled by a source computer.
  14. 24. - Small text file used to send information about a user to a server.
  15. 25. - Consists of a collection of software programs that installs on a computer and allows an intruder to take administrative control.
  16. 26. - Software application that performs specific network functions.
  17. 29. - Destructive program that contaminates files on the infected computer and spreads to other computers without prompting from the user.
  18. 30. - Combination of characteristics that include such things as its length, file name(s) used, mode of infection or replication, the areas of the system that are attacked, the type of software programs that are attacked, and the name or length of the file attachment.
  19. 31. - Gathers information about a user's web-browsing habits.
Down
  1. 2. - Program that changes the configuration of a browser.
  2. 5. - Type of malware that seizes control of your computer and demands payment to unlock it.
  3. 8. - Designed to support advertisements such as popups and may also gather information about the user.
  4. 9. - Class of virus that appears as a desired download.
  5. 10. - Occurs when a network server or web server is flooded with requests to the point that it cannot fulfill the request.
  6. 11. - Hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer.
  7. 12. - Designed to breach security and steal passwords.
  8. 13. - Destructive program that is slipped into an application and remains dormant until some event takes place.
  9. 14. - Deceptive practice based on poisoning a Domain Name Service (DNS) server with an incorrect IP address for a website.
  10. 15. - Software that is typically written to duplicate itself and, in the process. cause problems and possible permanent damage to a computer.
  11. 17. - Virus that changes as it evolves to resist detection.
  12. 21. - Designed to go undetected and leave a hole in the security system of a computer or network.
  13. 27. - Unsolicited junk e-mail or junk electronic newsletters.
  14. 28. - Windows feature that checks the integrity of the operating system during the boot process and only allows digitally signed software to boot and run on the computer.