Across
- 3. a computer system on the internet that is expressly set up to attract and trap intruders
- 5. the state of being complete or uncorrupted
- 6. data can be accessed when needed
- 8. spoofed emails and fraudulent websites designed to fool recipients into divulging PII
- 12. small text files that are saved on the computer for use with web browsers and websites
- 13. another word for "technical" skills
- 17. Governs the type of traffic that is and isn't allowed through a firewall
- 21. a governmental organization for standardizing measurement, technology, and industrial standards
- 22. the physical part of a computer that you can touch
- 23. a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
- 24. the condition of being private or secret
Down
- 1. using a lie or scam to obtain private info
- 2. the #1 cause of information security breaches for organizations
- 4. This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
- 7. deploys when conditions exist that malware is seeking
- 9. the internet protocol that has 128 bits
- 10. the Act that ensures that financial businesses are protecting your private data
- 11. a tool that intercepts raw data traveling on a network
- 14. a malicious website using a URL similar to a real one (ex.: www.aple.com)
- 15. malware hidden inside other software that seems harmless
- 16. acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
- 18. a flaw or potential for harm
- 19. a program or code that replicates by being copied or initiating its copying to another program
- 20. the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam
