chapter 3 cyber security

12345678910111213141516171819202122232425262728293031323334
Across
  1. 2. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  2. 4. using reconnaissance to phish someone
  3. 6. phishing but on messeges
  4. 8. going threw your trash
  5. 10. is any software intentionally designed to cause disruption to a computer
  6. 15. following someone
  7. 18. emails that are annoying
  8. 19. phishing but on call
  9. 20. fraud
  10. 21. persuades the user to take a specific action based on fear
  11. 22. a software that records what you type on your keyboard
  12. 23. looking over your shoulder and gathers info like that
  13. 27. the flash and shockwave plugins from adobe enable the development of cartoons
  14. 28. a means of bypassing an organization's existing security systems.
  15. 30. when hackers hack you and hold it until you give them what you want
  16. 31. software that enables a criminal to obtain info about a users computer
  17. 32. malicious program that uses a trigger to awaken the malicious cod
  18. 33. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
  1. 1. can propagate or self-replicate from one computer to another without human activation
  2. 3. following someone but its not piggybacking
  3. 5. use emails, messege, or other social media to try and gather informastion on you
  4. 7. impersonating a legitimate website
  5. 8. overwelming the network
  6. 9. completely non technical means for a criminal to gather info
  7. 11. displays annoying pop-ups to generate revenue for its authors
  8. 12. when an attacker calls a person and lies to them to gain privlages
  9. 13. programs that claim to perform one function but actually do another, typically malicious
  10. 14. a computer attack that tries to exploit software vulnerability that are unkown
  11. 16. intercepting communications between computers to steal information
  12. 17. keeping your system up to date
  13. 24. an act intended to deceive or trick
  14. 25. a program designed to detect and remove viruses
  15. 26. phishing highpowered people
  16. 29. an impersonation attack
  17. 34. similar to eavesdropping