chapter 5 - computer issues

12345678910111213141516
Across
  1. 5. one of categories of backup
  2. 7. Vulnerable computer that is set up to entice an intruder to break into it
  3. 9. Hardware ______ is the act of defacing or destroying computer equipment
  4. 10. is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
  5. 11. A _______ device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  6. 12. a process of converting readable data into unreadable characters to prevent unauthorized access
  7. 16. A hardware and/or software that protects a network’s resources from intrusion
Down
  1. 1. a small text file that a Web server stores on your computer
  2. 2. A compromised computer
  3. 3. a program or set of instructions in a program that allow users to bypass security controls
  4. 4. Digital _______ are used by areas such as law enforcement, criminal prosecutors and military intelligence
  5. 5. a technique intruders use to make their network or Internet transmission appear legitimate
  6. 6. incorporating comfort, efficiency, and safety into the design of items in the workplace
  7. 8. one of health concerns due to excessive use of computers
  8. 13. A malicious program that hides within or looks like a legitimate program
  9. 14. Hardware _______ is the act of stealing computer equipment
  10. 15. to make a copy of a file