Across
- 2. Also known as junk mail, is unsolicited e-mail.
- 3. A form of attack that prevents users from accessing normal services, such as e-mail and a web server.
- 5. Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- 10. Should be fully erased to prevent the possibility of recovery using specialized software.
- 11. Is a program written with malicious intent and sent out by attackers.
- 12. Is a software program that displays advertising on your computer.
- 13. Is a file or program other then a virus that is potentially harmful.
Down
- 1. Is the protocol suite that is used to control all of the communications on the Internet.
- 2. A __________ engineer is a person who is able to gain access to equipment.
- 4. Is similar to adware.
- 6. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring.
- 7. Technically a worm.
- 8. Programming language that allows applets to run within a web browser.
- 9. Is a self-replicating program that is harmful to networks.
- 10. Destruction is the process of removing sensitive data from hardware and software before recycling or discarding.