Across
- 1. Short-range ad-hoc “on-the –fly” wireless pairing technology.
- 6. Phishing attack variation that Targeting wealthy individuals
- 8. Introducing information to harm or destroy a network.
- 9. Phishing attack variation that automatically redirects user to a fraudulent Web site
- 10. The use of hiding data within other fil
- 11. Flaw or weakness that allows a threat agent to bypass security
- 16. An attacker whose motivation may be ideological or for the sake of principles or beliefs.
- 18. An infected computer that is under the remote control of an attacker
- 20. Item that has value
- 21. Prove that Information is correct and unaltered
- 22. General term Malicious software
- 24. Unsolicited e-mail
Down
- 2. Also known as piggybacking, is the act of following behind an authorized individual through an access door
- 3. An executable program that does something other than advertised
- 4. A situation that involves exposure to some type of danger.
- 5. Only approved individuals may access information
- 7. Information is accessible to authorized users
- 12. agent A person or element with power to carry out a threat
- 13. Use to hide inside security details to outsiders
- 14. making an illicit copy of a transmission before sending it to the original recipient
- 15. A false warning, usually claiming to come from the IT department
- 17. file that store user-specific information on user’s local computer
- 19. A software that gathers information without user consent
- 23. Malicious program that uses a computer network to replicate
