Across
- 2. A cyber attack intended to redirect a website's traffic to another, fraudulent site.
- 10. Attempts to crack passwords or keys through trial and error, not by exploiting any inherent weakness in the encryption but by sheer volume of attempts.
- 11. The placement of malicious code in SQL statements, via web page input, to manipulate a database behind the website.
- 12. The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 13. Insufficient rules and guidelines that govern the use and security of a network, which can lead to vulnerabilities.
- 14. The act of capturing and reading packets as they cross a network or part of a network. If the packets are not encrypted, their content can be read.
Down
- 1. Any software package which automatically renders advertisements to generate revenue for its author.
- 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 4. A form of malware designed to trick victims into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
- 5. Malicious software that replicates itself by modifying other computer programs and inserting its own code.
- 6. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- 7. Malware that locks or encrypts the victim's data until a ransom is paid.
- 8. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 9. An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
