fundamental securiy

123456789101112131415161718
Across
  1. 2. technology created by Microsoft to control interactivity on web pages
  2. 4. form of attack that uses many infected computer to launch an attack
  3. 5. uses zombies to make tracking the origins of the DoS attack more difficult to locate
  4. 7. network sniffers used to exact usernames and passwords to be used at a later date
  5. 8. denial of service
  6. 9. a program that runs on a computer to allow or deny traffic between the computer and the network
  7. 10. gains access to resources and devices by pretending to be a trusted computer
  8. 11. a program written with malicious intent and sent out by attackers
  9. 13. events or attacks that steal, damage, or destroy equipment
  10. 15. a worm that doesn't need to be attached to other software
  11. 17. a file or program other then a virus that is potentially harmful
  12. 18. a data file containing known characterstics of an individual
Down
  1. 1. compares physical characteristics against stored profiles to authenticate people
  2. 3. a software program that displayes advertising on your computer
  3. 6. also known as secure erase
  4. 8. changes to the DNS records on a system to point to false servers where data is recorded
  5. 10. a comprehensive update application containing patches and upgrades by the manufacturer
  6. 12. data being transported on a network
  7. 14. code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  8. 16. programming language that allows applets to run within a web browser