Across
- 3. Threat, A blended threat is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
- 6. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- 8. a local or restricted communications network, especially a private network created using World Wide Web software.
- 13. he global communication network that allows almost all computers worldwide to connect and exchange information. Some of the early impetus for such a network came from the U.S. government network Arpanet
- 14. An unauthorized user who attempts to or gains access to an information system.
- 16. designed to detect and destroy computer virusesAttack, An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- 17. Code, Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
- 18. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Down
- 1. Security, The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- 2. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- 4. A digital form of social engineering to deceive individuals into providing sensitive information.
- 5. The process of transforming plaintext into cipher text.
- 7. A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
- 9. Horse, A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
- 10. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator
- 11. A capability to limit network traffic between networks and/or information systems.
- 12. Door, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
- 15. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
