Across
- 2. What is a Trojan
- 5. data send between to hosts
- 6. What is another name for unsolicited email
- 7. What type of threat is stealing, damage, destroy equipment
- 8. allows or Denys traffic on a computer
- 9. what do anti-virus look for in software
- 13. permanently deleting something
- 16. file contents that hold known characteristics of someone
- 17. who is responsible for security
- 19. What type of virus is the most damaging
Down
- 1. what is another name for an infected computer
- 3. what is another name code updates
- 4. What reads info and operates without your computer knowing
- 6. A person that pretends to be a employee to get info on the company
- 10. What wed security controls interactivity between a app and computer
- 11. what is a common DoS attack
- 12. software that pretends to be a trusted computer
- 14. a way to safely access resources
- 15. what type of attack sniffs out user names and passwords in a network
- 18. How often should you check your security
