Cisco Chapter 3 Vocab!
Across
- 2. A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
- 5. The sending of unauthorized messages to another Bluetooth device
- 7. A document that specifies practices that must be agreed upon before gaining access to the network
- 10. An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
- 13. A form of fraud using text messaging to impersonate legitimate sources
- 14. Attacks made to boost malicious sites to rank higher in search results
- 15. Code that replicates itself independently; slows down networks
- 19. Malware that alters a computer browser’s settings to redirect to malicious websites; installed without permission
- 21. Malware that displays pop-ups; comes with Spyware
- 23. A form of fraud where the attackers use spoof calls from legitimate sources
- 28. An attack where criminals intercept a network by gaining the encryption key to analyze the network
- 29. A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
- 30. An attack that exploits the weaknesses in a program, such as not validating databases properly
- 32. Add-ons to browsers that display content developed for the appropriate software
- 34. A person tags along with authorized individuals for access to a restricted area
- 37. An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
- 38. A method in which criminals observe, or pay close attention to a victim to pick up sensitive information
- 40. An attack where the victim’s information, such as contacts, is copied by an attacker
- 41. A form of fraud where customized emails are sent to specific individuals
- 43. An act of deceiving or tricking someone; elicits a user reaction
- 44. Executable code attached to another executable file, usually a legitimate application; requires a host application
- 45. The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
Down
- 1. Malware that carries out operations through a legitimate-looking file
- 3. A fraud attack that targets high-profile individuals within organizations
- 4. Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
- 6. A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
- 8. A program that bypasses the normal authentication of a device
- 9. -A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
- 11. A type of network attack that results in the interruption of services to devices; Makes the network unavailable
- 12. A program that uses a trigger to awaken
- 16. An attack that manipulates individuals into performing actions or giving sensitive information; A non-technical means of gathering information
- 17. Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
- 18. - A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
- 20. The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
- 22. Software created to disrupt computer operations or gain access without permissions
- 24. The action of pretending to be someone else to undermine credibility
- 25. A program that exploits vulnerabilities and performs privilege escalation
- 26. Impersonation of legitimate websites to deceive users into entering sensitive credentials.
- 27. An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
- 31. Pop-up windows that persuade the user to act based on fear
- 33. A form of fraud where an attacker steals credentials by acting as a reputable source
- 35. A program that holds a computer captive until the target makes a payment
- 36. The process of going through a target trash to obtain information that is thrown out
- 39. An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication
- 41. Unsolicited mail containing harmful links, malware, or deceptive content
- 42. Software that tracks a user’s computer activities