Across
- 3. BREACH the unauthorized access and disclosure of sensitive information released outside of unauthorized organization
- 5. A computer checks the _____ of user names and passwords for a match before granting access.
- 6. ATTACK Which attack can be considered as the class of computer threats?
- 8. specialized techniques for gathering, retaining and analyzing data as evidence for investigations
- 9. A list of organizations that are considered trustworthy or allowed access/privilege
- 10. The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
Down
- 1. specialized techniques for gathering, retaining and analyzing data as evidence for investigations
- 2. CODE used to describe any cde in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- 4. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called
- 7. is a type of software designed to help the user's computer detect viruses and avoid them.