Security

123456789101112131415161718192021222324
Across
  1. 4. Technology created by Microsoft to control interactivity on web pages
  2. 6. also known as junk mail
  3. 8. Computer and ________ security helps to ensure that only authorized personnel have access
  4. 9. self-replicating program that is harmful to networks
  5. 11. Type of security that uses human interface, like a thumb scanner
  6. 12. Monitors users and sends reports back to the host
  7. 13. Threat from a user outside of the network
  8. 15. Code used to login to a locked account
  9. 16. Data is transformed using a complicated algorithm to make it unreadable
  10. 19. Windows feature that can encrypt data
  11. 21. An attack on the actual hardware
  12. 22. Threat from user inside the network.
  13. 24. malicious software that is disguised as a legitimate program
Down
  1. 1. The first generation security standard for wireless.
  2. 2. Type of attack that focuses on the software
  3. 3. Program that controls the traffic in and out of a computer
  4. 5. A program written with malicious intent, sent by hackers
  5. 6. Type of encryption that requires both sides of an encrypted conversation to use an encryption key to encode and decode the data
  6. 7. Type of encryption that requires two keys, a private key and a public key.
  7. 10. Minimum number of characters recommended in a password
  8. 14. Displaying unwanted ads on your computer
  9. 17. When the attacker pretends to be a legit organization
  10. 18. ensures that messages are not corrupted or tampered with during transmission
  11. 20. malicious program that gains full access to a computer system
  12. 23. A data _________ stores a copy of the information on a computer to removable backup media that can be kept in a safe place.