IDM4301 Exercise

12345678910111213141516
Across
  1. 3. a device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  2. 4. a program that display a series of distorted characters and require the users to enter the characters correctly to continue using the website
  3. 7. a program that hinds in the computer and allow someone in remote location to take full control of the computer
  4. 9. a notice that guarantees a user or a website is legitimate
  5. 10. someone who accesses a computer or network illegal with the intent to breach the security
  6. 11. a potentially damaging programs that infects the computer negatively without user permission
  7. 13. a technique intruders use to make their network or Internet transmission appear legitimate
  8. 15. the act of defacing or destroying digital equipment
  9. 16. a device that provide power during a temporary or permanent loss of power
Down
  1. 1. an isolated decoy systems and services designed to look like production servers, but enabled to be susceptible to IT attackers.
  2. 2. a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
  3. 3. a program or set of instructions in a program that allow users to bypass security controls
  4. 4. someone who uses e-mail as a vehicle for extortion or blackmail corporate
  5. 5. the discovery, collection, and analysis of evidence found on computers and networks
  6. 6. a program that copies itself repeatedly in memory or network using up the computer resources
  7. 8. a hardware and/or software that protects a network’s resources from intrusion
  8. 12. a technology that creates an encrypted connection over a less secure network.
  9. 14. a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station