Across
- 2. Hackers using spyware to control your browser.
- 6. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- 7. Deciphers the information in an SSL Certificate.
- 8. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- 11. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- 12. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
- 1. Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
- 3. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- 4. A malicious program that records keystrokes.
- 5. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- 7. Encrypts the information in an SSL Certificate.
- 9. A program that hackers use to capture IDs and passwords on a network.
- 10. security feature used for larger networks that controls computers from one point.
