Cisco Chapter 3 Vocab!
Across
- 3. The action of pretending to be someone else to undermine credibility
- 6. Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
- 10. A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
- 12. A fraud attack that targets high-profile individuals within organizations
- 13. A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
- 24. A program that holds a computer captive until the target makes a payment
- 25. Malware that displays pop-ups; comes with Spyware
- 28. A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
- 34. Executable code attached to another executable file, usually a legitimate application; requires a host application
- 35. An attack where criminals intercept a network by gaining the encryption key to analyze the network
- 37. Add-ons to browsers that display content developed for the appropriate software
- 38. A form of fraud where an attacker steals credentials by acting as a reputable source
- 40. A form of fraud using text messaging to impersonate legitimate sources
- 41. An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication; comes in various forms, such as MAC and IP addresses
- 42. Attacks made to boost malicious sites to rank higher in search results
- 43. An attack that exploits the weaknesses in a program, such as not validating databases properly
- 44. A program, or code, that bypasses the normal authentication of a device
- 45. Impersonation of legitimate websites to deceive users into entering sensitive credentials.
Down
- 1. The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
- 2. Attacks that manipulate individuals into performing actions to benefit the attacker or giving sensitive information; A non-technical means of gathering information
- 4. A program that uses a trigger, such as dates, times, or programs, to activate
- 5. The process of going through a target’s trash to obtain information that is thrown out
- 7. An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
- 8. A form of fraud where customized emails are sent to specific individuals
- 9. The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
- 11. A type of network attack that results in the interruption of services to devices; Makes the network unavailable
- 14. A method in which criminals observe,or pay close attention to a victim to pick up sensitive information
- 15. The sending of unauthorized messages to another Bluetooth device
- 16. Pop-up windows that persuade the user to act based on fear
- 17. A document that specifies practices that must be agreed upon before gaining access to a network
- 18. A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
- 19. A program that exploits vulnerabilities and performs privilege escalation; Used to create backdoors
- 20. A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
- 21. Malware that alters a computer browser’s settings to redirect users to malicious websites; installed without permission
- 22. Software created to disrupt computer operations or gain access without permissions
- 23. An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
- 26. A person tags along with authorized individuals for access to a restricted area
- 27. Code that replicates itself independently; slows down networks
- 29. Unsolicited mail containing harmful links, malware, or deceptive content
- 30. Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
- 31. An attack where the victim’s information, such as contacts, is copied by an attacker through the use of Bluetooth
- 32. Malware that carries out operations through the disguise of a legitimate-looking file
- 33. An act of deceiving or tricking someone; elicits a user reaction
- 36. A form of fraud where the attackers use spoof calls from legitimate sources
- 39. An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
- 41. Software that tracks a user’s computer activities