Across
- 2. The principle of allowing users or applications the least amount of permissions necessary to perform their intended function
- 4. A piece of code that is deliberately inserted into a system to trigger a malicious program
- 6. One of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention
- 9. Disabling network access to specific computers to prevent the spread of malware to the rest of the organization
- 12. The user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system
- 13. A network of computers infected malicious software and controlled as a group without the owners knowledge. Usually controlled for malicious intent
- 14. An alert that incorrectly indicates that malicious activity is occurring.
Down
- 1. The method or pathway in which attackers use to gain access to a system
- 3. A authentication method which takes into account the unique physical qualities of a person
- 5. A disaster recovery site with standard equipment installed. An organization can usually be operational again in a couple days in case of a disaster. Computers and servers are not usually installed here
- 7. Process to remove information from media such that information recovery is not possible
- 8. A technique used to gain information about a computer system on a network and the services running on its open ports
- 10. Searching for Wi-Fi networks from a moving vehicle
- 11. When two or more computers or network devices try to transmit data to the same device at the same time.
- 15. An attack that takes advantage of a software vulnerability or security flaw
