Ricardo Mora

123456789101112131415
Across
  1. 1. Programming language that allows applets to run within a web browser. Examples of applets include a calculator or a counter
  2. 4. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
  3. 7. Users outside of an organization that do not have authorized access to the network or resources
  4. 8. a type of virus
  5. 10. Programming language developed to interact with HTML source code to allow interactive websites. Examples include a rotating banner or a popup window
  6. 11. Technology created by Microsoft to control interactivity on web pages. If ActiveX is on a page, an applet or small program has to be downloaded to gain access to the full functionality
  7. 12. – Gains access to resources on devices by pretending to be a trusted computer
  8. 15. a virus that jis installed by the backward without your knowledge
Down
  1. 2. a way to attack you computer
  2. 3. is the protocol suite that is used to control all of the communications on the Internet. Unfortunately, TCP/IP can also make a network vulnerable to attackers.
  3. 5. Employees have access to data, equipment, and the network
  4. 6. Events or attacks that remove, corrupt, deny access, allow access, or steal information
  5. 9. the cable you use to have internet in a pc
  6. 13. is insolicitaded mail
  7. 14. Sends abnormally large amounts of requests to a system preventing access to the services