Chapter 8 - Vocabulary

1234567891011
Across
  1. 2. Fore Method used to decrypt a message by entering all possible combinations
  2. 3. horse A program that appears harmless by may allow hackers to gain access to the computer
  3. 4. An attack by multiple systems on a network.
  4. 6. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents
  5. 7. Fraudulent acquisition of sensitive information through the impersonation of a trustworthy source.
  6. 10. Engineering Technique used by an attacker to manipulate unsuspecting people into providing information
  7. 11. Junk E-mail messages sent to multiple recipients for either legitimate or fraudulent purposes
Down
  1. 1. Fraudulent acquisition of sensitive information primarily over telephone
  2. 5. An attack by a single system on a network
  3. 8. A malicious program, typically installed without a user's knowledge or permission
  4. 9. Self-replicating program to move itself across a network