Across
- 2. What is a written plan that describes the steps in an organization would take to restore its computer operations in the event of a disaster?\
- 4. What involves the examination of media, programs, data and logs files on computers, mobile devices, services, and networks?
- 5. What outlines the activities for which a computer or network may and may not be used?
- 11. What object is any item that must be carried to gain access to a computer or computer facility?
- 12. What signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender?
- 13. What is the process of converting readable data into unreadable characters to prevent unauthorized access?
- 15. What is the unauthorized and illegal duplication of copyrighted software?
- 16. What describes an attack whose goal ranges from disabling a goverment's computer network to crippling a country?
- 18. What agreement is the right to use software?
- 19. What is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices?
Down
- 1. What is an assault whose purpose is to disrupt computer access to an Internet service such as web or email?
- 3. What is the most common type of license included with software purchased by individual users?
- 6. What occurs when someone steals personal or confidential information?
- 7. What is a web app that evaluates your computer or mobile device to check for internet and email vulnerabilities?
- 8. What control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer?
- 9. What delivers a way of infectious code once the infected file is launched?
- 10. What type of device authenticates a person's identity by translating a person characteristic into digital code that then is compared with digital code stored in the computer verifying a physical or behavioral characteristic?
- 14. What is a wireless network name, which you should change from default to something that uniquely identifies your network?
- 17. What is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network?
