Across
- 3. data send between to hosts
- 5. what is a common DoS attack
- 6. what is another name code updates
- 8. What wed security controls interactivity between a app and computer
- 9. allows or Denys traffic on a computer
- 10. A person that pretends to be a employee to get info on the company
- 14. How often should you check your security
- 16. a way to safely access resources
- 17. file contents that hold known characteristics of someone
- 18. permanently deleting something
Down
- 1. What type of threat is stealing, damage, destroy equipment
- 2. What is another name for unsolicited email
- 4. What type of virus is the most damaging
- 7. what is another name for an infected computer
- 10. What reads info and operates without your computer knowing
- 11. what do anti-virus look for in software
- 12. who is responsible for security
- 13. software that pretends to be a trusted computer
- 15. what type of attack sniffs out user names and passwords in a network
- 18. What is a Trojan
