COMPUTER FRAUD AND ABUSE TECNIQUES
Across
- 2. A segment of self-replicating, executable code that attaches itself to a file or program.
- 5. Capture data from information packets as they travel over networks. Captured data are examined to find confidential or proprietary information.
- 8. Stealing contact lists, images, and other data using flaws in bluetooth applications
- 9. Copies itself automatically and actively transmits itself directly
Down
- 1. Taking control of someone else's phone to make or listen to calls
- 3. Conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs.
- 4. Hides data files inside a host file, such as a large image or sound file.
- 6. Once triggered, the bomb goes off, destroying programs, data, or both. It also known as logic bomb.
- 7. Set of computer instructions that allows a user to bypass the system’s normal controls. Anyone who discover it can enter the program.