Across
- 2. Fore Method used to decrypt a message by entering all possible combinations
- 3. horse A program that appears harmless by may allow hackers to gain access to the computer
- 4. An attack by multiple systems on a network.
- 6. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents
- 7. Fraudulent acquisition of sensitive information through the impersonation of a trustworthy source.
- 10. Engineering Technique used by an attacker to manipulate unsuspecting people into providing information
- 11. Junk E-mail messages sent to multiple recipients for either legitimate or fraudulent purposes
Down
- 1. Fraudulent acquisition of sensitive information primarily over telephone
- 5. An attack by a single system on a network
- 8. A malicious program, typically installed without a user's knowledge or permission
- 9. Self-replicating program to move itself across a network
