Security
Across
- 3. can be disabled on the OS to prevent hackers from quickly running malicious activity on a machine via USB
- 5. a code update that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
- 6. malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.
- 8. a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
- 10. software program that displays advertising on your computer, often displayed in a pop-up window
- 12. distributed without user intervention or knowledge, monitors activity on the computer
- 14. sending enough requests to overload a resource or even stopping its operation
Down
- 1. _____ address filtering is a technique used to deploy device-level security on a wireless LAN.
- 2. is a specialized chip installed on the motherboard to be used for hardware and software authentication.
- 4. compares physical characteristics against stored profiles to authenticate people.
- 5. attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
- 7. additional security measure. Hardware and or software packages.
- 8. is unsolicited email that can be used to send harmful links or deceptive content.
- 9. new viruses are always being developed, therefore security software must be continually updated to keep up with the malicious _________ __________.
- 11. a self-replicating program that uses the network to duplicate its code to the hosts on the network. Travels silently.
- 13. supports robust encryption, providing government-grade security. (most effective way of securing wireless traffic)
- 15. a software code that is deliberately created by an attacker. May collect sensitive information or may alter or destroy information.