COSC 1300 Introduction to Computing Chapter 11: Computer Security, Ethics, and Privacy 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 Author: R. Garrett; Made using Crossword Weaver(TM) ACROSS 3 When a mobile user connects to a main office using a standard Internet connection, a ____ (VPN) provides the mobile user with a secure connection to the company network server. (3 words) 6 Some notebook computers use passwords, possessed objects, and biometrics as methods of ____. COSC 1300 Introduction to Computing Chapter 11: Computer Security, Ethics, and Privacy 7 The ____ is the destructive event or prank a malicious-logic program is intended to deliver. Also, computer viruses, worms, and Trojan horses deliver their ____ on a computer when a user opens an infected file, runs an infected program, and boots the computer with an infected disk in a disk drive. 10 A(n) ____ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. 13 To prevent unauthorized access and use, at a minimum a company should have a written ____ (AUP) that outlines the computer activities for which a computer or network may and may not be used. (3 words) 14 When users purchase software, a ____ license agreement permits users to install the software on only one computer, make one copy of the software as backup, and give or sell the software to another individual if the software is removed from the user?s computer first. (2 words; hyphenated) 17 Many businesses use ____ to limit employees? Web access. (2 words) 20 Internet advertising firms often use ____ to collect information about users Web browsing habits. 23 ____ (S-HTTP), which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates. (hyphenated) 27 A ____ is a separate area of a hard disk that holds an infected file until the infection can be removed. 28 A(n) ____ server is a server outside a company?s network that controls which communications pass into the company?s network. 29 The term ____ refers to online or Internet-based illegal acts. 31 One of the more common causes of ____ is an electrical power variation. (2 words) 34 A virus ____ is a known specific pattern of virus code. 37 A(n) ____ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. (2 words) 38 ____ (SSL), which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate. (3 words) 40 The computer that a hacker uses to execute a DoS or DDoS attack, known as a ____, is completely unaware that it is being used to attack other systems. 41 A ____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. (2 words) 42 A(n) ____ gives authors and artists exclusive rights to duplicate, publish, and sell their materials. 44 Examples of ____ devices and systems include fingerprint scanners and hand geometry systems, face recognition systems and voice recognition systems, and signature verification systems and iris recognition systems. Also a(n) ____ device authenticates a person?s identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. 45 The term ____, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. 46 A Web site that uses encryption techniques to secure its data is known as a(n) ____ site. 47 Symptoms of a user with computer ____ include all of the following: craves computer time, unable to stop computer activity, and neglects family and friends. 48 A(n) ____ signature is an encryption code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender. Also, a(n) ____ certificate is a notice that guarantees a user or Web site is legitimate. 49 ____ is the process of converting readable data into unreadable characters to prevent unauthorized access. 50 Each character added to a ____ significantly increases the number of combinations and the length of time it might take for someone or for a hacker?s computer to guess the ____. 53 A UPS connects between a computer and a ____. (2 words) DOWN 1 With a(n) ____ backup, users choose which folders and files to include in a backup. 2 In addition to access controls, a computer should maintain a(n) ____ trail that records both successful and unsuccessful access attempts. 4 ____ access is the use of a computer or network without permission. 5 A computer ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user?s knowledge or permission. 8 A(n) ____ backup copies all of the files in a computer. 9 A ____ is a small text file that a Web server stores on a user?s computer. Also, Web sites use a session ____ to keep track of items in a user?s shopping cart. Also, ____s is/are not considered spyware because a user knows it/they exist(s). 10 With a three-generation backup policy, the ____ is the most recent copy of the file. 11 Personal computers, display devices, and printers should comply with guidelines of the ____ program. (2 words) 12 ____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. 15 In its simplest form, a(n) ____ is a programmed formula that the recipient of encrypted data uses to decrypt the ciphertext. (2 words) 16 With a three-generation backup policy, the ____ is the oldest copy of the file. 18 Computer ____ is the discovery, collection, and analysis of evidence found on computers and networks. Also, computer ____ is used by military intelligence, insurance agencies, and law enforcement. 19 Content ____ is the process of restricting access to certain material on the Web. 21 To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the ____ (BSA). (3 words) 22 A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second). 24 To avoid spam users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources. (2 words; first word hyphenated) 25 Some viruses are hidden in ____, which are instructions saved in an application such as a word processing or spreadsheet program. 26 To prevent ____ (RSI), take all of the following precautions: place a wrist rest between the keyboard and the edge of the desk, place the mouse at least six inches from the edge of the desk, and minimize the number of switches between the mouse and the keyboard. (3 words) 30 A(n) ____ agreement is the right to use software. 32 A certificate ____ is an authorized person or company that issues and verifies digital certificates. 33 A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. 35 With a three-generation backup policy, the ____ is the second oldest copy of the file. 36 A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. 39 ____ continues for all of the following reasons: in some countries, legal protection for software does not exist, it is a fairly simple crime to commit, and many buyers believe they have the right to copy software they have paid for. (2 words) 43 ____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user?s personal and financial information. 51 ____ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 52 A ____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. rpgarrett Crossword Weaver - C:\Documents and Settings\rpgarrett\My Documents\Tyler Junior College\Fall2009\Fall 2009 Shared Resources\
Want to see the other 2 page(s) in puzzle11.pdf?JOIN TODAY FOR FREE!