Chapter 5 part 6

12345678910111213141516171819
Across
  1. 3. Computer viruses like worms and Trojan horses delivers this.
  2. 5. Written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
  3. 6. Program that hides in a computer or mobile device and allows someone to remotely control it.
  4. 7. Any item that must be carried to gain access to a computer.
  5. 9. An attack with the goal to disable a government's computer network.
  6. 10. Most common type of license agreement.
  7. 11. Security measure that defines who can access a computer.
  8. 13. Right to use the software.
  9. 14. This occurs when someone steals personal or confidential information.
  10. 15. Encryption code that a person, website, or organization attaches to an email to verify the identity of the sender.
  11. 17. Web app that evaluates your computer to check for vulnerabilities.
  12. 18. Process of converting data into unreadable characters to prevent unauthorized access.
  13. 19. Wireless network name.
Down
  1. 1. Unauthorized and illegal duplication of copyrighted software.
  2. 2. Program in or set of instructions to bypass security controls.
  3. 4. Outline of activities that are prohibited and permitted on a network.
  4. 8. An attack whose purpose is to disrupt internet service.
  5. 12. The examination of media, programs, data, and log files on computer systems.
  6. 16. Type of device that requires a personal characteristic to authenticate a user.