Security
Across
- 4. Technology created by Microsoft to control interactivity on web pages
- 6. also known as junk mail
- 8. Computer and ________ security helps to ensure that only authorized personnel have access
- 9. self-replicating program that is harmful to networks
- 11. Type of security that uses human interface, like a thumb scanner
- 12. Monitors users and sends reports back to the host
- 13. Threat from a user outside of the network
- 15. Code used to login to a locked account
- 16. Data is transformed using a complicated algorithm to make it unreadable
- 19. Windows feature that can encrypt data
- 21. An attack on the actual hardware
- 22. Threat from user inside the network.
- 24. malicious software that is disguised as a legitimate program
Down
- 1. The first generation security standard for wireless.
- 2. Type of attack that focuses on the software
- 3. Program that controls the traffic in and out of a computer
- 5. A program written with malicious intent, sent by hackers
- 6. Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
- 7. Type of encryption that requires two keys, a private key and a public key.
- 10. Minimum number of characters recommended in a password
- 14. Displaying unwanted ads on your computer
- 17. When the attacker pretends to be a legit organization
- 18. ensures that messages are not corrupted or tampered with during transmission
- 20. malicious program that gains full access to a computer system
- 23. A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.