Chapter 8 - Vocabulary

12345678910111213141516
Across
  1. 3. A device or application installed
  2. 4. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents
  3. 7. An IP address that is not obainted automatically but manually configured.
  4. 10. horse A program that appears harmless by may allow hackers to gain access to the computer
  5. 11. Piece of code inserted into a program to improve its functioning or to correct an error
  6. 12. Fraudulent acquisition of sensitive information primarily over telephone
  7. 14. A malicious program, typically installed without a user's knowledge or permission
  8. 15. A physical or logical subnetwork that exposes an external facing to a larger and untrusted network.
  9. 16. An attack by multiple systems on a network.
Down
  1. 1. Fraudulent acquisition of sensitive information through the impersonation of a trustworthy source.
  2. 2. Documentation that details system, physical, and behavioral constraints in an organization
  3. 5. Network only accessible to internal employees of an orginization
  4. 6. Self-replicating program to move itself across a network
  5. 8. Software that once installed, automatically displays advertising material on a program
  6. 9. Engineering Technique used by an attacker to manipulate unsuspecting people into providing information
  7. 13. Fore Method used to decrypt a message by entering all possible combinations
  8. 14. Junk E-mail messages sent to multiple recipients for either legitimate or fraudulent purposes
  9. 15. An attack by a single system on a network