websites

123456789101112131415161718
Across
  1. 3. Threat, A blended threat is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
  2. 6. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  3. 8. a local or restricted communications network, especially a private network created using World Wide Web software.
  4. 13. he global communication network that allows almost all computers worldwide to connect and exchange information. Some of the early impetus for such a network came from the U.S. government network Arpanet
  5. 14. An unauthorized user who attempts to or gains access to an information system.
  6. 16. designed to detect and destroy computer virusesAttack, An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. 17. Code, Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
  8. 18. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Down
  1. 1. Security, The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. 2. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  3. 4. A digital form of social engineering to deceive individuals into providing sensitive information.
  4. 5. The process of transforming plaintext into cipher text.
  5. 7. A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
  6. 9. Horse, A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  7. 10. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator
  8. 11. A capability to limit network traffic between networks and/or information systems.
  9. 12. Door, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
  10. 15. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.