Security

123456789101112131415
Across
  1. 3. can be disabled on the OS to prevent hackers from quickly running malicious activity on a machine via USB
  2. 5. a code update that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
  3. 6. malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful.
  4. 8. a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
  5. 10. software program that displays advertising on your computer, often displayed in a pop-up window
  6. 12. distributed without user intervention or knowledge, monitors activity on the computer
  7. 14. sending enough requests to overload a resource or even stopping its operation
Down
  1. 1. _____ address filtering is a technique used to deploy device-level security on a wireless LAN.
  2. 2. is a specialized chip installed on the motherboard to be used for hardware and software authentication.
  3. 4. compares physical characteristics against stored profiles to authenticate people.
  4. 5. attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
  5. 7. additional security measure. Hardware and or software packages.
  6. 8. is unsolicited email that can be used to send harmful links or deceptive content.
  7. 9. new viruses are always being developed, therefore security software must be continually updated to keep up with the malicious _________ __________.
  8. 11. a self-replicating program that uses the network to duplicate its code to the hosts on the network. Travels silently.
  9. 13. supports robust encryption, providing government-grade security. (most effective way of securing wireless traffic)
  10. 15. a software code that is deliberately created by an attacker. May collect sensitive information or may alter or destroy information.