Across
- 3. _______is an attack on an information system that takes advantage of a particular system vulnerability.
- 5. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often a virus is attached to a file, so that when the infected file is opened, the virus executes
- 6. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- 10. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- 11. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- 13. Type of attacker that Type of attacker Cause problems, steal data, and corrupt systems
- 14. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- 16. Type of attacker that Capture trade secrets and gain competitive advantage Cybercriminal Gain financially
- 18. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- 20. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- 21. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
Down
- 1. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- 2. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- 4. ______is a program in which malicious code is hidden inside a seemingly harmless program.
- 7. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- 8. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- 9. Type of attacker thatGain financially and/or disrupt company’s information systems and business operations
- 12. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- 15. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- 17. Type of attacker that Promote political ideology Cyberterrorist Destroy infrastructure components of financial
- 19. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- 22. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
