COMM 205 IS Security

123456789101112131415
Across
  1. 3. A harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs.
  2. 8. ____ engineering Involves conning your way into acquiring information that you have no right to.
  3. 10. The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
  4. 12. Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
  5. 13. Software that is written with malicious intent to cause annoyance or damage.
  6. 14. The process of making computer and network systems more resistant to tampering or malicious software.
  7. 15. A software program or hardware device that is used to increase security on its network by blocking unwanted data.
Down
  1. 1. A type of virus that replicates and spreads itself.
  2. 2. A string of characters used to verify or “authenticate” a person’s identity.
  3. 4. An illegal activity that is committed with the use of a computer.
  4. 5. The procedure for making extra copies of data in case the original is lost or damaged.
  5. 6. A name used in conjunction with a password to gain access to a computer system or a network service.
  6. 7. When someone accesses a computer without permission.
  7. 9. Occurs when a user receives an e-mail that looks as if it is from a trusted source, asking them to click a link and log in to a website that mimics the genuine website.
  8. 11. A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.