Across
- 6. a security system.
- 8. Certificates for e-commerce sites, sites that process sensitive data, and sites that
- 12. security feature used for larger networks that controls computers from one point.
- 14. A program that hackers use to capture IDs and passwords on a network.
- 15. A malicious program that records keystrokes.
- 17. Using a script or program to log on to an account using hundreds of words or
- 19. Encrypts the information in an SSL Certificate.
- 20. privacy and security requirements.
Down
- 1. information.
- 2. number, and one special character.
- 3. Certificates for e-commerce sites, sites that process sensitive data, and sites that
- 4. Deciphers the information in an SSL Certificate.
- 5. Chronic physical malady that can result when a person makes too many of the
- 7. Hackers using spyware to control your browser.
- 9. Complex and secure, containing at least eight characters and at least one letter,
- 10. information about the user, the user's browsing habits, and other
- 11. motions over a long period of time.
- 13. privacy and security requirements.
- 16. Invading someone else's computer, usually for personal gain or the satisfaction of
- 18. Software installed surreptitiously on a personal computer with the goal of
- 19. stored in a dictionary file.
