RU ITEC411 Chapter 5

1234567891011121314151617181920
Across
  1. 7. _____ engineering is the manipulation of people to bypass security protocols
  2. 8. attempting to deceive a user by making them think it is a safe website
  3. 10. the use if physical identifying information the secure valuables
  4. 14. a network of computers that relay back to a host with malware
  5. 15. ____ phishing is personalized phishing attack usually when the target is known
  6. 16. hacking for a political cause
  7. 18. a ____ horse is a kind of virus that discusses itself
  8. 19. an exploit left into the system that allows the user to bypass normal security measures
  9. 20. a bug found in 2014 that allowed hackers the access unencrypted user information
Down
  1. 1. ____ theft personal information to impersonate the person
  2. 2. the part of the CIA triad that ensures the data is readily available when needed
  3. 3. Malicious software that attaches to other parts of software
  4. 4. the use of mass email to try and gain information from someone posing as something else
  5. 5. the part of the CIA triad that ensures that data remains private
  6. 6. devices installed on credit card that steal the information from the card
  7. 9. malicious software that keeps track of various activities on the computer
  8. 11. the part of the CIA triad that ensures that the the data is only access by those who should have access
  9. 12. the encryption of personal files with the demand that an amount be paid for release
  10. 13. the use of mass text to try and gain information from someone posing as something else
  11. 17. Malicious software that works in a similar manner to a virus but works on its own