Chapter 12 Vocab

1234567891011121314151617181920212223242526272829303132
Across
  1. 4. technology that uses physical characteristics to authenticate
  2. 6. the most popular asymmetric encryption
  3. 7. a feature that follows instructions from a special file when new media is inserted
  4. 8. a LAN that uses radio waves to transmit data between wireless data
  5. 10. a feature that can be used to encrypt data
  6. 11. a attack that uses multiple computers to create a large amount of requests to a network server
  7. 13. a type of malware that records every keystroke made by a user
  8. 16. the set of rules that governs the delivery of data over a network
  9. 17. the most popular hashing algorithm
  10. 18. a feature that allows new media to connect to the computer easily
  11. 19. a type of hardware that allows connections to peripherals without effort
  12. 24. a cheat or loophole
  13. 25. a limited type of text that is at the most basic form
  14. 26. a old function that takes a message and makes it 128 bits long
  15. 30. a protocol for receiving email by downloading it from a computer
  16. 31. a company that provides internet security and has a red color
  17. 32. a subnetwork that provides services to an untrusted network
Down
  1. 1. a malware that breaches the security of a computer that appears harmless
  2. 2. a feature that allows you to encrypt an entire hard drive
  3. 3. a company that deals with online security
  4. 5. a person that breaks into code and firewalls with malicious intent
  5. 9. data that is transmitted or stored without an encryption
  6. 12. a Windows module that is also used for administration of system settings
  7. 14. a type of computer made from Lenovo
  8. 15. a request that is the initial communication to establish a TCP connection
  9. 20. a company that provides internet security and has a green color
  10. 21. a protocol that enables devices to add themselves into a network without user interaction
  11. 22. a malware that replicates itself so it can spread to other computers
  12. 23. a computer company that made the ThinkPad
  13. 27. a service that translates URLs to IP addresses that can be exploited to make directions imposter servers
  14. 28. a MMC file with tools used to create automatic tasks
  15. 29. the use of radio waves to real and capture data on a tag on hardware
  16. 31. a type of attack that intercepts data transfer through a network