Across
- 1. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- 7. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- 9. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- 10. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- 12. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- 14. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- 15. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- 16. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- 17. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- 20. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- 21. Type of attacker that Promote political ideology.
- 22. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Down
- 2. ______is a program in which malicious code is hidden inside a seemingly harmless program.
- 3. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- 4. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- 5. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- 6. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- 8. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- 11. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- 13. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- 18. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- 19. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
