Across
- 2. Uses network sniffers to extract usernames and passwords to be used at a later date to gain access.
- 3. Is a person who is able to gain access to equipment or a network by tricking people.
- 6. Prevents unauthorized access to the local computer and the network.
- 9. Users outside of an organization that do not have authorized access to the network or resources.
- 12. Gains access to resources on devices by pretending to be a trusted computer.
- 14. Changes the DNS records on a system to point to false servers where the data is recorded.
- 15. Sends abnormally large amounts of requests to a system preventing access to the services.
- 16. Is the protocol suite that is used to control all of the communications on the Internet.
- 19. Accidental threats are when the user damages data or equipment unintentionally.
- 22. Also known as junk mail
- 23. Programming language developed to interact with HTML source code to allow interactive websites.
- 24. Created by Microsoft to control interactivity on webpages.
Down
- 1. Events or attacks that steal, damage, or destroy equipment.
- 4. A large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.
- 5. A software program that displays advertising on your computer.
- 7. A file or program other then a virus that can be harmful.
- 8. Events or attacks that remove, corrupt, deny access, allow access or steal information.
- 10. Distributed without any user knowledge.
- 11. Uses "zombies" to make tracing the origin of the DoS attack difficult to locate.
- 13. A series of repeated, larger than normal pings that crash the receiving computer.
- 17. Intercepts or inserts false information in traffic between two hosts.
- 18. Programming language that allows applets to run within a web browser.
- 20. Randomly opens TCP ports.
- 21. Fundamental Security.
- 25. A program that is written with malicious intent and sent out by attackers.
