Across
- 2. A file infected with a virus that cannot be automatically cleaned can be quarantined, meaning that the anti-virus software blocks any attempt by the user to open it. A PC can also be said to be quarantined by removing it from a network.
- 5. Any defined method of performing a process, but in encryption, the term specifically refers to the technique used to encrypt a message. The strength of an algorithm depends to a large extent on the size of its key (the code that enables a message to be encrypted or decrypted).
- 6. Any authentication technology that allows a user to authenticate once and receive authorizations for multiple services.
- 9. Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them). A Social Security number is a good example of PII.
- 10. A measure by which to evaluate compliance with a policy
- 13. The department in an organization in charge of recruiting and hiring employees as well as terminating or retiring them.
- 16. Under this system, keys are issued as digital certificates by a Certificate Authority (CA). The CA acts as a guarantor that the user is who he or she says he or she is.
- 17. Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.
- 19. Software that records information about a PC and its user. Aggressive spyware is used to gather passwords or financial information such as credit card details.
- 21. Used in conjunction with authentication devices such as smart cards; as the PIN should be known only to the user, loss of the smart card should not represent a security risk.
- 22. General advice for how to do the right thing when the situation is too complex for detailed procedures.
- 23. A type of malware that tries to extort money from the victim by appearing to lock their computer or by encrypting their files.
- 24. A type of virus that spreads through memory and network connections rather than infecting files.
Down
- 1. Access control model where resources are protected by inflexible, system defined rules.
- 3. Software capable of detecting and removing virus infections and (in most cases) other types of malware.
- 4. Identifying features stored as digital data can be used to authenticate a user. Typical features used include facial pattern, iris, retina, or fingerprint pattern, and signature recognition. This requires the relevant scanning device, such as a fingerprint reader, and a database of biometric information (template).
- 7. A secure tunnel created between two endpoints connected via an unsecure network (typically the Internet).
- 8. Software fixes or improvements offered by the software manufacturer that often include patches to security vulnerabilities.
- 11. A means for a user to prove their identity to a computer system. Authentication is implemented as either something you know (a username and password), something you have (a smart card or key fob), or something you are (biometric information). Often, more than one method is employed (2-factor authentication).
- 12. Obtaining user authentication or financial information through a fraudulent request for information. Phishing is usually associated with emailing users with a link to a fake site.
- 14. Junk messages sent over email.
- 15. Code designed to infect computer files (or disks) when it is activated. A virus may also be programmed to carry out other malicious actions, such as deleting files or changing system settings.
- 18. A secret text string used as part of a logon. To be secure, a password should be sufficiently complex (so that it cannot be guessed or "cracked" by password-guessing software).
- 20. Access control model where each resource is protected by an Access Control List (ACL) managed by the resource's owner (or owners).
