Across
- 7. Is someone who uses the Internet or network to destroy or damage computers for political reasons?
- 10. what is a program or set of instructions in a program that allows users to bypass security controls?
- 11. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
- 13. What kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
- 14. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Down
- 1. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
- 2. How long can digital certificates be valid?
- 3. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
- 4. What type of individual may steal credit card numbers to make fraudulent purchases?
- 5. What is the term for a program that performs a repetitive task on a network?
- 6. Is someone who demands payment in order to stop an attack on an organization's
- 8. What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
- 9. What is the term for a website that uses encryption techniques to protect its data?
- 12. What term refers to making a copy of a file?
