Clone of MISM5306 4-5

12345678910111213141516171819202122232425
Across
  1. 1. redundant array of independent disks
  2. 6. transforms data into a scrambled form call ciphertext
  3. 7. a type of Trojan program used to release a virus, worm, or other destructive code
  4. 8. short for modulator-demodulator
  5. 9. a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
  6. 10. travels from computer to computer in a network, but id does not usually erase data.
  7. 11. a self-propagating program code that is triggered by a specified time or event
  8. 13. contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
  9. 15. means that computers and networks are operating and authorized users can access the information they need
  10. 18. designed to protect systems from unauthorized access in order to preserve data integrity
  11. 22. sending fraudulent e-mails that seem to come from a legitimate source
  12. 23. the aount of data that can be transferred from one point to another in a certain time period
  13. 25. attempt to gain access to a network by posing as an authorized user
Down
  1. 2. this attack floods a network or server with service requests to prevent legitimate users access to the system.
  2. 3. a programming routine built into a system by its designer or programmer
  3. 4. rules that govern data communication
  4. 5. secure tunnel through the internet
  5. 12. network connection device containing software the connects network systems and controls traffic flow between them
  6. 14. capturing and recording network traffic
  7. 15. loss of power in a signal as it travels from the sending device to the receiving device
  8. 16. the address that allows network traffic to be routed to your desktop
  9. 17. issued $5 billion in check to identity thieves
  10. 19. an inexpensive way to secure a computer to a desktop or counter
  11. 20. this card enables computers to communicate over a network
  12. 21. a type of router
  13. 24. can protect against both external and internal access