Across
- 5. a what is a program or set of instructions in a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
- 7. an object is any item that must be carried to gain access to a computer or computer facility
- 9. a what is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer devices
- 10. involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks
- 11. along with worms, and Trojan horses deliver their what on a computer or mobile devices when a user opens an infected file or runs an infected program
- 14. the what act gives law enforcement the right to monitor people's activities, including web and email habits
- 15. is the unauthorized and illegal duplication
- 16. a what device authenticates a person's identity by translating a personal characteristic in a a digital code
Down
- 1. the term what describes an attack whose goal ranges from disabling a government's computer network to crippling a country
- 2. a what control is a security measure that defines who can access a computer
- 3. occurs when someone steals personal or confidential information
- 4. is the process of converting readable data into unreadable characters to prevent unauthorized access
- 6. a what is a web app that evaluates you computer or mobile device to check for Internet and email vulnerabilities
- 8. a what attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email
- 12. signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
- 13. an agreement is the right to use software
