Security Vocabulary

1234567891011121314151617181920
Across
  1. 2. – the most recent version of a file.
  2. 3. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  3. 8. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  4. 10. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  5. 11. a computer program that performs the same operation many times in a row
  6. 14. access to a computer program that bypasses all security.
  7. 16. is the use of Internet based attacks in terrorist activities
  8. 17. is encrypted text
  9. 18. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.
  10. 19. is any method of encrypting text
Down
  1. 1. signal that identifies user
  2. 2. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  3. 4. is someone who breaks into someone else's computer system
  4. 5. payment of royalties on the Internet
  5. 6. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. 7. a unique code assigned to a buyer to verify transactions
  7. 9. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  8. 10. it is technology that measures the biological part of the computer.
  9. 12. test designed to differentiate humans from automated programs.
  10. 13. are programs that Web sites put on your hard disk.
  11. 15. is any computer program designed to facilitate illegal activity online.
  12. 20. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.