Across
- 3. a device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
- 4. a program that display a series of distorted characters and require the users to enter the characters correctly to continue using the website
- 7. a program that hinds in the computer and allow someone in remote location to take full control of the computer
- 9. a notice that guarantees a user or a website is legitimate
- 10. someone who accesses a computer or network illegal with the intent to breach the security
- 11. a potentially damaging programs that infects the computer negatively without user permission
- 13. a technique intruders use to make their network or Internet transmission appear legitimate
- 15. the act of defacing or destroying digital equipment
- 16. a device that provide power during a temporary or permanent loss of power
Down
- 1. an isolated decoy systems and services designed to look like production servers, but enabled to be susceptible to IT attackers.
- 2. a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
- 3. a program or set of instructions in a program that allow users to bypass security controls
- 4. someone who uses e-mail as a vehicle for extortion or blackmail corporate
- 5. the discovery, collection, and analysis of evidence found on computers and networks
- 6. a program that copies itself repeatedly in memory or network using up the computer resources
- 8. a hardware and/or software that protects a network’s resources from intrusion
- 12. a technology that creates an encrypted connection over a less secure network.
- 14. a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station