CIS212 In-Seat Review W2

123456789101112131415161718192021222324
Across
  1. 5. General term Malicious software
  2. 6. Short-range ad-hoc “on-the –fly” wireless pairing technology.
  3. 11. The use of hiding data within other fil
  4. 12. Item that has value
  5. 14. Use to hide inside security details to outsiders
  6. 15. making an illicit copy of a transmission before sending it to the original recipient
  7. 17. A false warning, usually claiming to come from the IT department
  8. 19. Only approved individuals may access information
  9. 20. A situation that involves exposure to some type of danger.
  10. 22. Phishing attack variation that automatically redirects user to a fraudulent Web site
  11. 24. Also known as piggybacking, is the act of following behind an authorized individual through an access door
Down
  1. 1. Malicious program that uses a computer network to replicate
  2. 2. An attacker whose motivation may be ideological or for the sake of principles or beliefs.
  3. 3. An executable program that does something other than advertised
  4. 4. Flaw or weakness that allows a threat agent to bypass security
  5. 7. Unsolicited e-mail
  6. 8. file that store user-specific information on user’s local computer
  7. 9. Introducing information to harm or destroy a network.
  8. 10. A software that gathers information without user consent
  9. 13. agent A person or element with power to carry out a threat
  10. 16. Information is accessible to authorized users
  11. 18. An infected computer that is under the remote control of an attacker
  12. 21. Phishing attack variation that Targeting wealthy individuals
  13. 23. Prove that Information is correct and unaltered