Across
- 5. General term Malicious software
- 6. Short-range ad-hoc “on-the –fly” wireless pairing technology.
- 11. The use of hiding data within other fil
- 12. Item that has value
- 14. Use to hide inside security details to outsiders
- 15. making an illicit copy of a transmission before sending it to the original recipient
- 17. A false warning, usually claiming to come from the IT department
- 19. Only approved individuals may access information
- 20. A situation that involves exposure to some type of danger.
- 22. Phishing attack variation that automatically redirects user to a fraudulent Web site
- 24. Also known as piggybacking, is the act of following behind an authorized individual through an access door
Down
- 1. Malicious program that uses a computer network to replicate
- 2. An attacker whose motivation may be ideological or for the sake of principles or beliefs.
- 3. An executable program that does something other than advertised
- 4. Flaw or weakness that allows a threat agent to bypass security
- 7. Unsolicited e-mail
- 8. file that store user-specific information on user’s local computer
- 9. Introducing information to harm or destroy a network.
- 10. A software that gathers information without user consent
- 13. agent A person or element with power to carry out a threat
- 16. Information is accessible to authorized users
- 18. An infected computer that is under the remote control of an attacker
- 21. Phishing attack variation that Targeting wealthy individuals
- 23. Prove that Information is correct and unaltered
