ITS2210 Module 3 Crossword

1234567891011121314151617181920
Across
  1. 2. A virus that exploits buffer overflows
  2. 5. A popular port scanner
  3. 6. A key logger is this type of malware
  4. 8. The source code for a program or the act of programming
  5. 10. The most common way for a virus to spread
  6. 11. A person who hacks into phone systems
  7. 16. Virus scanning that continually runs in the background
  8. 17. A hole in the security system deliberately left by the creator of the system
  9. 18. Blocking this will prevent a ping scan
  10. 19. Attempting to list all of the servers on a network
  11. 20. This should be done to all unneeded ports on a firewall to prevent attacks
Down
  1. 1. A popular enumeration tool
  2. 3. Software loaded onto your machine, often without your knowledge, which causes ads to pop up on your screen. This technology often works in a different manner than web page pop-ups; thus, pop-up blockers will not stop it
  3. 4. A person who uses hacking techniques for Illegal activities
  4. 7. Virus scanning that runs when requested by the user
  5. 9. Depends on the attacker gaining physical access to the machine
  6. 12. Software that logs key strokes on a computer
  7. 13. Based on creating a SQL statement that is always true
  8. 14. A virus attack that uses a multimodal approach
  9. 15. A vulnerability scanner designed specifically for Windows systems