1:00
en
CR
7
Antivirus software :a class of programs that searches your hard drive and floppy disks for any known or potential viruses
Social Engineering:a non-technical kind of intrusion that relies heavily on human interaction involving to trick people into breaking their own security procedures
authentication: the process of determining whether someone or something is, in fact, who or what it is declared to be
Trojan Horse: a program in which malicious or harmful code is contained inside apparently harmless programming or data
Malware: a program in which malicious or harmful code is contained inside apparently harmless programming or data
Firewall: a set of related programs, usually located at a network gateway server that protects the resources of a private network from other networks
Encryption: the conversion of data into a cipher text that cannot be easily understood by unauthorized people
Across:3. | the process of determining whether someone or something is, in fact, who or what it is declared to be | 4. | a set of related programs, usually located at a network gateway server that protects the resources of a private network from other networks |
| 6. | a non-technical kind of intrusion that relies heavily on human interaction involving to trick people into breaking their own security procedures | 7. | a class of programs that searches your hard drive and floppy disks for any known or potential viruses |
| | Down:1. | a program in which malicious or harmful code is contained inside apparently harmless programming or data | 2. | a program in which malicious or harmful code is contained inside apparently harmless programming or data |
| 5. | the conversion of data into a cipher text that cannot be easily understood by unauthorized people |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only
Across:3. | the process of determining whether someone or something is, in fact, who or what it is declared to be | 4. | a set of related programs, usually located at a network gateway server that protects the resources of a private network from other networks |
| 6. | a non-technical kind of intrusion that relies heavily on human interaction involving to trick people into breaking their own security procedures | 7. | a class of programs that searches your hard drive and floppy disks for any known or potential viruses |
| | Down:1. | a program in which malicious or harmful code is contained inside apparently harmless programming or data | 2. | a program in which malicious or harmful code is contained inside apparently harmless programming or data |
| 5. | the conversion of data into a cipher text that cannot be easily understood by unauthorized people |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only