CIS 212 Week 1 & 2 Review

123456789101112131415161718192021222324
Across
  1. 1. Short-range ad-hoc “on-the –fly” wireless pairing technology.
  2. 6. Phishing attack variation that Targeting wealthy individuals
  3. 8. Introducing information to harm or destroy a network.
  4. 9. Phishing attack variation that automatically redirects user to a fraudulent Web site
  5. 10. The use of hiding data within other fil
  6. 11. Flaw or weakness that allows a threat agent to bypass security
  7. 16. An attacker whose motivation may be ideological or for the sake of principles or beliefs.
  8. 18. An infected computer that is under the remote control of an attacker
  9. 20. Item that has value
  10. 21. Prove that Information is correct and unaltered
  11. 22. General term Malicious software
  12. 24. Unsolicited e-mail
Down
  1. 2. Also known as piggybacking, is the act of following behind an authorized individual through an access door
  2. 3. An executable program that does something other than advertised
  3. 4. A situation that involves exposure to some type of danger.
  4. 5. Only approved individuals may access information
  5. 7. Information is accessible to authorized users
  6. 12. agent A person or element with power to carry out a threat
  7. 13. Use to hide inside security details to outsiders
  8. 14. making an illicit copy of a transmission before sending it to the original recipient
  9. 15. A false warning, usually claiming to come from the IT department
  10. 17. file that store user-specific information on user’s local computer
  11. 19. A software that gathers information without user consent
  12. 23. Malicious program that uses a computer network to replicate