Security+Chap2

123456789101112131415161718192021222324252627
Across
  1. 2. attacks against cryptographic implementations or crypto algorithms
  2. 4. group of compromised computers known as robots
  3. 5. code that can run on a computer without any action from the user, self-replicating
  4. 9. master computer that controls the botnet
  5. 11. malware that occurs in memory of computer
  6. 12. in the clear
  7. 13. malware that restricts access to a system or encrypts files and demands payment
  8. 15. malicious software downloaded unwittingly from a website or installed with some third-party software
  9. 16. an attack on a hashing system that attempts to send two different messages for the same hash
  10. 18. list of encrypted passwords located in a lookup table
  11. 20. attacker captures credit card information from a cardholder
  12. 22. attacker uses this to bypass normal authorization
  13. 23. advanced form of ransomware that leverages advanced encryption techniques
  14. 25. spyware that records your keystrokes
  15. 26. software designed to gain administrator-level control over a computer system without being detected
  16. 27. code added to software that will initiate when something specific happens
Down
  1. 1. password attack where every possible password is attempted
  2. 3. form of spyware that includes grayware, adware or jokes
  3. 6. attack when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
  4. 7. password attack uses a prearranged list of ordinary words
  5. 8. malicious software
  6. 10. software appears to perform a desired function but actually is performing malicious functions behind the scenes
  7. 12. password attack where attacker uses simple passwords against targeted user accounts and moves on to other accounts before being detected
  8. 14. type of attack where attackers target security weaknesses in the supply network
  9. 17. attacker clones a credit card or SIM card
  10. 19. computer used to distribute malware across the internet, also a zombie
  11. 21. two different files end up using the same hash, MD5
  12. 24. a trojan used to gain back-end access to a server