Across
- 4. a wireless technology for exchanging data over short distances.
- 5. Computer viruses are small programs or scripts that can negatively affect the health of your computer
- 8. A technology that allows us to access our files and/or services through the internet from anywhere in the world
- 10. A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to be used in the event IT data are lost.
- 12. Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service
- 14. the determining factor in the classification of an enclave of servers/computers
- 15. An audio or video clip that has been edited and manipulated to seem real or believable.
- 16. A network point that acts as an entrance to another network
- 20. Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted
- 24. Any program that acts to produce copies of itself. Examples include; a program, a worm, or virus.
- 27. Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
- 28. Unauthorized act of bypassing the security mechanisms of a system.
- 29. Software that is intended to damage or disable computers and computer systems
- 30. An attempt to gather information about an information system for the apparent purpose of circumventing its security controls.
- 31. the science that deals with the logic of form, quantity, and disposition
- 32. A feature or defect of a computer system that allows surreptitious unauthorized access to data
- 35. A bot is an automated program that runs over the Internet
- 36. A decoy system or network that serves to attract potential attackers.
Down
- 1. The activity of defrauding an online account holder of financial information by posing as a legitimate company
- 2. Is global system of interconnected computer networks that use the internet protocol suite
- 3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 6. a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
- 7. A hacker security tool that captures passwords and message traffic to and from a computer.
- 9. A block of data sent over the network transmitting the identities of the sending and receiving stations, error-control information, and message.
- 10. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 11. Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- 13. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- 17. a process that ensures and confirms a user’s identity.
- 18. Self replicating virus that does not alter files but resides in active memory and duplicates itself
- 19. Type of incident involving insertion of a large volume of data resulting in denial of service.
- 21. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- 22. A person who uses computers to gain unauthorized access to data
- 23. A weakness in automated system security procedures, technical controls, environmental controls, administrative controls, internal controls, etc., that could be used as an entry point to gain unauthorized access to information or disrupt critical processing.
- 25. Software agent that performs a function or operation on behalf of another application or system while hiding the details involved.
- 26. To indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities.
- 33. a way for the website to recognize you and keep track of your preferences.
- 34. Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive