Across
- 4. A set of instructions in a program that allows users to bypass security controls
- 5. The process of sharing computing resources among computers and devices on a network
- 7. A type of attack that overloads a resource, thus making it unavailable to legitimate users
- 8. A ratio that measures how much power enters a computer facility compared to how much power is used
- 10. All data is backed up whenever a change is made
- 11. A unique hardware identifier for your device
- 13. Protects individuals against the wrongful disclosure of their health information
- 15. The discovery, collection, and analysis of evidence found on a computer or network
- 16. The phase of disaster recovery that includes the evacuation plan
- 17. A normal looking yet fraudulent Wi-Fi network
- 18. A program that copies itself repeatedly and spreads throughout the network without human help
- 20. An animal loving hacker who might deface the website of a local meat packing plant
- 22. Technique used by attackers to make their traffic look legitimate to the victim device
- 23. A common infringement of copyright
Down
- 1. The process of ensuring that the person requesting access to a computer or network is not an imposter
- 2. Online or Internet-based illegal acts
- 3. Attacks that attempt to trick the victim into giving information to the attacker
- 6. The movement to ensure that all users have access to devices, data, and infrastructure
- 7. The record of everything you do online
- 9. A private secure path across a public network
- 10. The process of restricting access to certain material
- 12. A part of the web that is accessed using special software, providing anonymity to its users
- 14. A private combination of words associated with a username
- 19. Any event or action that could cause loss or damage
- 21. A type of authentication that combines multiple types of authentication to provide more secure access
