Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

Security

Hector M.

1   2                   3  
     
    4 5 6  
    7                
           
           
8  
9                  
10    
  11 12  
  13                   14
         
15               16      
     
17                
     
18            

Across
1.confirming the identity of a person
7.a full disk encryption feature included with the Ultimate and Enterprise editions of Microsoft's Windows Vista and Windows 7 desktop operating systems
9.the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge
13.software used to prevent, detect, and remove malware
15.feature used to delete data on a hard drive
16.the use of electronic messaging systems to send unsolicited bulk messages indiscriminately
17.a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
18.consists of programming designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
Down
1.any software package which automatically plays, displays, or downloads advertisements to a computer
2.software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system
3.a set of programs that manage computer hardware resources and provide common services for application software
4.program designed to securely erase a hard disk until data is permanently removed and no longer recoverable
5.a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention
6.a security protocol used in the IEEE 802.11 wireless networking standard
8.a weak security algorithm for IEEE 802.11 wireless networks
10.a small infectious agent that can replicate only inside the living cells of organisms
11.a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass
12.a general term sometimes used as a classification for applications that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than malware
14.security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog