09/1/19 abdul melon work

123456789101112131415161718192021
Across
  1. 2. horse - A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
  2. 6. surfing - Watching an authorized user enter a security code on a keypad
  3. 8. - A type of Malware that locates and saves data from users without them knowing about it
  4. 9. Hat Hacking - Engage in hacking for illegal purposes, often for financial gain, though also for notoriety. Their hacks (and cracks) result in inconvenience and loss for both the owners of the system they hack and the users
  5. 11. - A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. 14. - An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
  7. 16. - software that encrypts programs and data until a ransom is paid to remove it
  8. 17. - collection of captured bot computers
  9. 20. - program that hides in a computer and allows someone from a remote location to take full control of computer
  10. 21. pro quo - Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
  1. 1. - A destructive computer program that bores its way through a computer's files or through a computer's network
  2. 3. - advertising-supported software.any software that shows adverts,popups.it can be harmless,but can include spyware
  3. 4. - An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  4. 5. - Unauthorized access, modification, or use of an electronic device or some element of a computer system
  5. 7. - An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information
  6. 9. - Criminals make a promise of goods in return for details, such as offering a free music download
  7. 10. - When someone deceives by pretending to be someone else in order to get personal data
  8. 12. - an error in a program that prevents the program from running as expected
  9. 13. Denial of Service (DDoS) - An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use. Often performed via botnets
  10. 15. hat hacking - hackers penetrate security to test it, and inform the institution of vulnerabilities they find without exploiting them. This does not break IT security laws
  11. 18. hat hacking - hacking into systems for 'fun' or to 'troll.'
  12. 19. - malware that allows a cyber-security attacker to take control of an infected computer.