Across
- 2. interception of a conversation
- 4. attaches itself to opened programs
- 5. self-replicates across a network
- 7. holds data until a fee is paid
- 9. recording keystrokes done by the user
- 10. bypassing authentication
- 11. inserting malicious code into a database
- 12. overwhelming a system with traffic
- 13. changes its code
- 16. hides admin access
- 18. memory flooding attack
- 19. cross-site scripting
- 20. malicious code that activates when something triggers it or a date is reached
- 22. secretly monitors user's actions
- 23. password guessing
Down
- 1. horses disguised as a helpful tool
- 3. categories of system weaknesses
- 6. a trojan infecting a web browser
- 8. generally used hacking strategies
- 14. tricking humans
- 15. weaknesses within a system
- 17. attack taking advantage of unsolved patches
- 21. pop-up ads
