Across
- 6. a what attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email
- 9. involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks
- 10. the term what describes an attack whose goal ranges from disabling a government's computer network to crippling a country
- 13. is the unauthorized and illegal duplication
- 14. signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Down
- 1. occurs when someone steals personal or confidential information
- 2. an object is any item that must be carried to gain access to a computer or computer facility
- 3. a what device authenticates a person's identity by translating a personal characteristic in a a digital code
- 4. an agreement is the right to use software
- 5. is the process of converting readable data into unreadable characters to prevent unauthorized access
- 7. a what control is a security measure that defines who can access a computer
- 8. a what is a web app that evaluates you computer or mobile device to check for Internet and email vulnerabilities
- 11. a what is a program or set of instructions in a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
- 12. a what is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer devices
