Across
- 1. redundant array of independent disks
- 6. transforms data into a scrambled form call ciphertext
- 7. a type of Trojan program used to release a virus, worm, or other destructive code
- 8. short for modulator-demodulator
- 9. a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
- 10. travels from computer to computer in a network, but id does not usually erase data.
- 11. a self-propagating program code that is triggered by a specified time or event
- 13. contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
- 15. means that computers and networks are operating and authorized users can access the information they need
- 18. designed to protect systems from unauthorized access in order to preserve data integrity
- 22. sending fraudulent e-mails that seem to come from a legitimate source
- 23. the aount of data that can be transferred from one point to another in a certain time period
- 25. attempt to gain access to a network by posing as an authorized user
Down
- 2. this attack floods a network or server with service requests to prevent legitimate users access to the system.
- 3. a programming routine built into a system by its designer or programmer
- 4. rules that govern data communication
- 5. secure tunnel through the internet
- 12. network connection device containing software the connects network systems and controls traffic flow between them
- 14. capturing and recording network traffic
- 15. loss of power in a signal as it travels from the sending device to the receiving device
- 16. the address that allows network traffic to be routed to your desktop
- 17. issued $5 billion in check to identity thieves
- 19. an inexpensive way to secure a computer to a desktop or counter
- 20. this card enables computers to communicate over a network
- 21. a type of router
- 24. can protect against both external and internal access
