Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

CIS 100: Ch 11 Worksheet

Xavier Cooper

1
2                    
  3 4
5                   6                  
       
7         8
  9 10                  
             
             
11                        
         
  12     13  
14                            
        15      
  16        
           
  17                      
           
         
   
 

Across
2.a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
5.a branch of computer technology known as information security ... security because the involved risks
10.an undocumented way to get access to a computer system or the data it contains.
11.something which attracts people in great numbers
14.a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
15.A malicious program that replicates itself until it fills all of the storage space on a drive or network.
17.a child or teenager who gains illegal access to computer systems, often by using hacking programs downloaded from the Internet
Down
1.an attempt to make a computer resource unavailable to its intended users
3.a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.
4.Any of a number of security schemes that prevent unauthorized users from gaining access to a computer network or that monitor transfers of information to and from the network.
6.4.A person who breaks into a computer system, typically for an illegal purpose
7.A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
8.Software that is intended to damage or disable computers and computer systems.
9.A program that enters a computer usually without the knowledge of the operator.
12.stealthy type of malicious software (malware) designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer
13.the act or an instance of impersonating another person on the Internet or via email
16.1.An enthusiastic and skillful computer programmer or user

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog