Chapter 5 part 6

12345678910111213141516171819
Across
  1. 3. Program that hides in a computer or mobile device and allows someone to remotely control it.
  2. 4. Web app that evaluates your computer to check for vulnerabilities.
  3. 7. The examination of media, programs, data, and log files on computer systems.
  4. 12. Outline of activities that are prohibited and permitted on a network.
  5. 14. Unauthorized and illegal duplication of copyrighted software.
  6. 16. An attack whose purpose is to disrupt internet service.
  7. 17. An attack with the goal to disable a government's computer network.
  8. 18. Process of converting data into unreadable characters to prevent unauthorized access.
  9. 19. This occurs when someone steals personal or confidential information.
Down
  1. 1. Right to use the software.
  2. 2. Any item that must be carried to gain access to a computer.
  3. 5. Encryption code that a person, website, or organization attaches to an email to verify the identity of the sender.
  4. 6. Security measure that defines who can access a computer.
  5. 8. Written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
  6. 9. Type of device that requires a personal characteristic to authenticate a user.
  7. 10. Wireless network name.
  8. 11. Most common type of license agreement.
  9. 13. Program in or set of instructions to bypass security controls.
  10. 15. Computer viruses like worms and Trojan horses delivers this.