Across
- 2. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- 6. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- 9. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- 10. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- 11. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- 12. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- 15. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- 16. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- 17. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- 19. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of prpgramming code is attached to a file, so that when the infected file is opened, the code executes
- 20. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- 22. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Down
- 1. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- 3. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- 4. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- 5. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- 7. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- 8. ______is a program in which malicious code is hidden inside a seemingly harmless program.
- 10. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- 13. Type of attacker that Promote political ideology.
- 14. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- 18. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- 21. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
