Across
- 5. one of categories of backup
- 7. Vulnerable computer that is set up to entice an intruder to break into it
- 9. Hardware ______ is the act of defacing or destroying computer equipment
- 10. is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
- 11. A _______ device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
- 12. a process of converting readable data into unreadable characters to prevent unauthorized access
- 16. A hardware and/or software that protects a network’s resources from intrusion
Down
- 1. a small text file that a Web server stores on your computer
- 2. A compromised computer
- 3. a program or set of instructions in a program that allow users to bypass security controls
- 4. Digital _______ are used by areas such as law enforcement, criminal prosecutors and military intelligence
- 5. a technique intruders use to make their network or Internet transmission appear legitimate
- 6. incorporating comfort, efficiency, and safety into the design of items in the workplace
- 8. one of health concerns due to excessive use of computers
- 13. A malicious program that hides within or looks like a legitimate program
- 14. Hardware _______ is the act of stealing computer equipment
- 15. to make a copy of a file