Across
- 4. *You can thank MIT for this term that once described quick and dirty code that was functional but not stable*
- 6. A network of computers infected by malware that are under the control of a single attacking party
- 7. *Occam says that a principle that states that the simplest explanation is usually the best*
- 9. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- 12. A feature or defect of a computer system that allows surreptitious unauthorized access to data
- 14. Computer security programs that simulate network resources that hackers are likely to look for to trap them
- 18. *0b11111101000, but in words*
- 19. Type of internet fraud that seeks to acquire a user’s credentials by deception
- 20. A security system that forms a virtual perimeter around a network of workstations
- 21. Code that has been written to take advantage of a vulnerability before the software vendor knows about it and can publish a patch for it
Down
- 1. Weaknesses in software programs
- 2. Every RazorPower Co. employee's favorite drink!
- 3. Any type of intrusive computer software with malicious intent against the user
- 5. Tricking someone into clicking on one object on a web page while they think they are clicking on another
- 8. Malicious computer program that is often sent as an email attachment or a download
- 10. protecting personal privacy and proprietary information
- 11. The process of decoding cipher text to plain text
- 13. Data is complete, trustworthy and has not been modified
- 15. The property of being genuine and being able to be verified and trusted
- 16. Everyday objects that are connected to the internet and are able to collect and transfer data automatically
- 17. Malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data