Across
- 1. ______horse, software that appears to be benign but does something other than expected.
- 3. protocols used for secure information transfer over the Internet
- 5. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
- 6. Write your initial here for identifier
- 7. enforce a security policy on data exchanged between its network and the Internet
Down
- 2. CryptoLocker is an example of
- 4. _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called
