Across
- 1. Programming language that allows applets to run within a web browser. Examples of applets include a calculator or a counter
- 4. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
- 7. Users outside of an organization that do not have authorized access to the network or resources
- 8. a type of virus
- 10. Programming language developed to interact with HTML source code to allow interactive websites. Examples include a rotating banner or a popup window
- 11. Technology created by Microsoft to control interactivity on web pages. If ActiveX is on a page, an applet or small program has to be downloaded to gain access to the full functionality
- 12. – Gains access to resources on devices by pretending to be a trusted computer
- 15. a virus that jis installed by the backward without your knowledge
Down
- 2. a way to attack you computer
- 3. is the protocol suite that is used to control all of the communications on the Internet. Unfortunately, TCP/IP can also make a network vulnerable to attackers.
- 5. Employees have access to data, equipment, and the network
- 6. Events or attacks that remove, corrupt, deny access, allow access, or steal information
- 9. the cable you use to have internet in a pc
- 13. is insolicitaded mail
- 14. Sends abnormally large amounts of requests to a system preventing access to the services
