Across
- 2. the unauthorized access and disclosure of sensitive information released outside of unauthorized organization
- 4. computer checks the __Data base___ of user names and passwords for a match before granting access.
- 5. A list of organizations that are considered trustworthy or allowed access/privilege
- 6. The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
- 7. users may receive a fake DM or fake order detail with a cancellation link
- 9. Which attack can be considered as the class of computer threats?
- 10. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called
Down
- 1. used to describe any cde in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- 3. specialized techniques for gathering, retaining and analyzing data as evidence for investigations
- 4. is a type of software designed to help the user's computer detect viruses and avoid them.
- 8. specialized techniques for gathering, retaining and analyzing data as evidence for investigations