Cisco Chapter 3 Vocab!

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 2. A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
  2. 5. The sending of unauthorized messages to another Bluetooth device
  3. 7. A document that specifies practices that must be agreed upon before gaining access to the network
  4. 10. An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
  5. 13. A form of fraud using text messaging to impersonate legitimate sources
  6. 14. Attacks made to boost malicious sites to rank higher in search results
  7. 15. Code that replicates itself independently; slows down networks
  8. 19. Malware that alters a computer browser’s settings to redirect to malicious websites; installed without permission
  9. 21. Malware that displays pop-ups; comes with Spyware
  10. 23. A form of fraud where the attackers use spoof calls from legitimate sources
  11. 28. An attack where criminals intercept a network by gaining the encryption key to analyze the network
  12. 29. A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
  13. 30. An attack that exploits the weaknesses in a program, such as not validating databases properly
  14. 32. Add-ons to browsers that display content developed for the appropriate software
  15. 34. A person tags along with authorized individuals for access to a restricted area
  16. 37. An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
  17. 38. A method in which criminals observe, or pay close attention to a victim to pick up sensitive information
  18. 40. An attack where the victim’s information, such as contacts, is copied by an attacker
  19. 41. A form of fraud where customized emails are sent to specific individuals
  20. 43. An act of deceiving or tricking someone; elicits a user reaction
  21. 44. Executable code attached to another executable file, usually a legitimate application; requires a host application
  22. 45. The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
Down
  1. 1. Malware that carries out operations through a legitimate-looking file
  2. 3. A fraud attack that targets high-profile individuals within organizations
  3. 4. Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
  4. 6. A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
  5. 8. A program that bypasses the normal authentication of a device
  6. 9. -A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
  7. 11. A type of network attack that results in the interruption of services to devices; Makes the network unavailable
  8. 12. A program that uses a trigger to awaken
  9. 16. An attack that manipulates individuals into performing actions or giving sensitive information; A non-technical means of gathering information
  10. 17. Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
  11. 18. - A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
  12. 20. The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
  13. 22. Software created to disrupt computer operations or gain access without permissions
  14. 24. The action of pretending to be someone else to undermine credibility
  15. 25. A program that exploits vulnerabilities and performs privilege escalation
  16. 26. Impersonation of legitimate websites to deceive users into entering sensitive credentials.
  17. 27. An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
  18. 31. Pop-up windows that persuade the user to act based on fear
  19. 33. A form of fraud where an attacker steals credentials by acting as a reputable source
  20. 35. A program that holds a computer captive until the target makes a payment
  21. 36. The process of going through a target trash to obtain information that is thrown out
  22. 39. An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication
  23. 41. Unsolicited mail containing harmful links, malware, or deceptive content
  24. 42. Software that tracks a user’s computer activities