Security Threats

123456789101112131415
Across
  1. 3. using common or well known words until the right password is discovered
  2. 6. using every possible password combination until the right one is discovered
  3. 8. broad category of malicious software
  4. 10. standing over someone's shoulder to view what's on their screen
  5. 11. able to replicate itself from system to system with NO user interaction
  6. 13. type of attack that seeks to overwhelm system resources
  7. 14. when hackers target a specific group of people or organization
  8. 15. sits quietly watching everything you do
Down
  1. 1. hides itself from the operating system and is invisible to anti-virus and anti-malware solutions
  2. 2. using people to get around security controls
  3. 4. someone who is not authorized to enter a particular area does so by following behind someone who is authorized
  4. 5. tricks users into running an application because they think it will do one thing but actually performs some other malicious function
  5. 7. able to replicate itself from system to system when a user runs an application
  6. 9. pretending to be someone you are not to gain network or system access
  7. 12. holds your system hostage until you pay money