COMPUTER FRAUD AND ABUSE TECNIQUES

123456789
Across
  1. 2. A segment of self-replicating, executable code that attaches itself to a file or program.
  2. 5. Capture data from information packets as they travel over networks. Captured data are examined to find confidential or proprietary information.
  3. 8. Stealing contact lists, images, and other data using flaws in bluetooth applications
  4. 9. Copies itself automatically and actively transmits itself directly
Down
  1. 1. Taking control of someone else's phone to make or listen to calls
  2. 3. Conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs.
  3. 4. Hides data files inside a host file, such as a large image or sound file.
  4. 6. Once triggered, the bomb goes off, destroying programs, data, or both. It also known as logic bomb.
  5. 7. Set of computer instructions that allows a user to bypass the system’s normal controls. Anyone who discover it can enter the program.