Across
- 3. A device or application installed
- 4. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents
- 7. An IP address that is not obainted automatically but manually configured.
- 10. horse A program that appears harmless by may allow hackers to gain access to the computer
- 11. Piece of code inserted into a program to improve its functioning or to correct an error
- 12. Fraudulent acquisition of sensitive information primarily over telephone
- 14. A malicious program, typically installed without a user's knowledge or permission
- 15. A physical or logical subnetwork that exposes an external facing to a larger and untrusted network.
- 16. An attack by multiple systems on a network.
Down
- 1. Fraudulent acquisition of sensitive information through the impersonation of a trustworthy source.
- 2. Documentation that details system, physical, and behavioral constraints in an organization
- 5. Network only accessible to internal employees of an orginization
- 6. Self-replicating program to move itself across a network
- 8. Software that once installed, automatically displays advertising material on a program
- 9. Engineering Technique used by an attacker to manipulate unsuspecting people into providing information
- 13. Fore Method used to decrypt a message by entering all possible combinations
- 14. Junk E-mail messages sent to multiple recipients for either legitimate or fraudulent purposes
- 15. An attack by a single system on a network
