Across
- 2. What allow a visited website to store its own information about a user on the user's computer?
- 8. Key logger is a ........
- 9. Phishing is a form of ..........
Down
- 1. What describes programs that can run independently travel from system to system and disrupt computer communication?
- 3. To hide information inside a picture, what technology is used?
- 4. The first computer virus is ........
- 5. What is the best keyword for taking advantage of a weakness in the security of an IT system?
- 6. When a person is harassed repeatedly by being followed, called or be written to he/she is a target of .........
- 7. A virus that migrates freely within a large population of unauthorized email user is called a ........
- 10. A packet with no flags set is which type of scan?
