Security Vocabulary

12345678910111213141516171819
Across
  1. 2. is the use of Internet based attacks in terrorist activities
  2. 5. is someone who breaks into someone else's computer system
  3. 6. a unique code assigned to a buyer to verify transactions
  4. 8. are programs that Web sites put on your hard disk.
  5. 9. -is an incident in which a user or is deprived of the services of a resource they would normally expect to have
  6. 12. - is a watchdog group dedicated to fighting software piracy, and teaching computer users about software copyrights and cyber-security
  7. 14. access to a computer program that bypasses all security.
  8. 15. a crime involving an attack against an enterprise, with a demand for money to stop the attack
  9. 17. is any computer program designed to facilitate illegal activity online.
  10. 19. A group of people in an organization who coordinate their response to breaches of security or other computer emergencies such as breakdowns and disasters.
Down
  1. 1. is encrypted text
  2. 3. it is technology that measures the biological part of the computer.
  3. 4. is any method of encrypting text
  4. 6. signal that identifies user
  5. 7. the most recent version of a file.
  6. 10. payment of royalties on the Internet
  7. 11. test designed to differentiate humans from automated programs.
  8. 12. computer program that performs the same operation many times in a row
  9. 13. filtering- is the use of a program to screen that excludes access or availability to Web pages or e-mail adresses
  10. 15. is a technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages.
  11. 16. is a point of sale technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.
  12. 18. is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet.