2105 - Chapter - 4

12345678910111213141516171819202122
Across
  1. 4. is an act or object that poses a danger to assets.
  2. 7. is the legal protection afforded an expression of an idea, such as a song, book, or video game.
  3. 8. monitoring policy stating explicitly how, when, and where the company
  4. 10. is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
  5. 11. is the assurance that messages and information remain available only to those authorized to view them.
  6. 13. scrambles information into an alternative form that requires a key or password to decrypt.
  7. 14. security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
  8. 15. includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website.
  9. 17. requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
  10. 21. is the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space
  11. 22. is a program that secretly takes over another computer for the purpose of launching attacks on other computers
Down
  1. 1. refers to a period of time when a system is unavailable
  2. 2. is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor
  3. 3. software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
  4. 5. is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them
  5. 6. is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals
  6. 9. is a method for confirming users' identities
  7. 12. is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
  8. 13. the principles and standards that guide our behavior toward other people
  9. 16. reroutes requests for legitimate websites to false websites.
  10. 18. is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
  11. 19. software is software that is manufactured to look like the real thing and sold as such
  12. 20. is a form of social engineering in which one individual lies to obtain confidential data about another individual.