Across
- 3. Program that hides in a computer or mobile device and allows someone to remotely control it.
- 4. Web app that evaluates your computer to check for vulnerabilities.
- 7. The examination of media, programs, data, and log files on computer systems.
- 12. Outline of activities that are prohibited and permitted on a network.
- 14. Unauthorized and illegal duplication of copyrighted software.
- 16. An attack whose purpose is to disrupt internet service.
- 17. An attack with the goal to disable a government's computer network.
- 18. Process of converting data into unreadable characters to prevent unauthorized access.
- 19. This occurs when someone steals personal or confidential information.
Down
- 1. Right to use the software.
- 2. Any item that must be carried to gain access to a computer.
- 5. Encryption code that a person, website, or organization attaches to an email to verify the identity of the sender.
- 6. Security measure that defines who can access a computer.
- 8. Written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
- 9. Type of device that requires a personal characteristic to authenticate a user.
- 10. Wireless network name.
- 11. Most common type of license agreement.
- 13. Program in or set of instructions to bypass security controls.
- 15. Computer viruses like worms and Trojan horses delivers this.
