Across
- 2. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- 4. using reconnaissance to phish someone
- 6. phishing but on messeges
- 8. going threw your trash
- 10. is any software intentionally designed to cause disruption to a computer
- 15. following someone
- 18. emails that are annoying
- 19. phishing but on call
- 20. fraud
- 21. persuades the user to take a specific action based on fear
- 22. a software that records what you type on your keyboard
- 23. looking over your shoulder and gathers info like that
- 27. the flash and shockwave plugins from adobe enable the development of cartoons
- 28. a means of bypassing an organization's existing security systems.
- 30. when hackers hack you and hold it until you give them what you want
- 31. software that enables a criminal to obtain info about a users computer
- 32. malicious program that uses a trigger to awaken the malicious cod
- 33. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
- 1. can propagate or self-replicate from one computer to another without human activation
- 3. following someone but its not piggybacking
- 5. use emails, messege, or other social media to try and gather informastion on you
- 7. impersonating a legitimate website
- 8. overwelming the network
- 9. completely non technical means for a criminal to gather info
- 11. displays annoying pop-ups to generate revenue for its authors
- 12. when an attacker calls a person and lies to them to gain privlages
- 13. programs that claim to perform one function but actually do another, typically malicious
- 14. a computer attack that tries to exploit software vulnerability that are unkown
- 16. intercepting communications between computers to steal information
- 17. keeping your system up to date
- 24. an act intended to deceive or trick
- 25. a program designed to detect and remove viruses
- 26. phishing highpowered people
- 29. an impersonation attack
- 34. similar to eavesdropping
