Cisco Chapter 3 Vocab!

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 3. The action of pretending to be someone else to undermine credibility
  2. 6. Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
  3. 10. A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
  4. 12. A fraud attack that targets high-profile individuals within organizations
  5. 13. A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
  6. 24. A program that holds a computer captive until the target makes a payment
  7. 25. Malware that displays pop-ups; comes with Spyware
  8. 28. A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
  9. 34. Executable code attached to another executable file, usually a legitimate application; requires a host application
  10. 35. An attack where criminals intercept a network by gaining the encryption key to analyze the network
  11. 37. Add-ons to browsers that display content developed for the appropriate software
  12. 38. A form of fraud where an attacker steals credentials by acting as a reputable source
  13. 40. A form of fraud using text messaging to impersonate legitimate sources
  14. 41. An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication; comes in various forms, such as MAC and IP addresses
  15. 42. Attacks made to boost malicious sites to rank higher in search results
  16. 43. An attack that exploits the weaknesses in a program, such as not validating databases properly
  17. 44. A program, or code, that bypasses the normal authentication of a device
  18. 45. Impersonation of legitimate websites to deceive users into entering sensitive credentials.
Down
  1. 1. The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
  2. 2. Attacks that manipulate individuals into performing actions to benefit the attacker or giving sensitive information; A non-technical means of gathering information
  3. 4. A program that uses a trigger, such as dates, times, or programs, to activate
  4. 5. The process of going through a target’s trash to obtain information that is thrown out
  5. 7. An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
  6. 8. A form of fraud where customized emails are sent to specific individuals
  7. 9. The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
  8. 11. A type of network attack that results in the interruption of services to devices; Makes the network unavailable
  9. 14. A method in which criminals observe,or pay close attention to a victim to pick up sensitive information
  10. 15. The sending of unauthorized messages to another Bluetooth device
  11. 16. Pop-up windows that persuade the user to act based on fear
  12. 17. A document that specifies practices that must be agreed upon before gaining access to a network
  13. 18. A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
  14. 19. A program that exploits vulnerabilities and performs privilege escalation; Used to create backdoors
  15. 20. A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
  16. 21. Malware that alters a computer browser’s settings to redirect users to malicious websites; installed without permission
  17. 22. Software created to disrupt computer operations or gain access without permissions
  18. 23. An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
  19. 26. A person tags along with authorized individuals for access to a restricted area
  20. 27. Code that replicates itself independently; slows down networks
  21. 29. Unsolicited mail containing harmful links, malware, or deceptive content
  22. 30. Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
  23. 31. An attack where the victim’s information, such as contacts, is copied by an attacker through the use of Bluetooth
  24. 32. Malware that carries out operations through the disguise of a legitimate-looking file
  25. 33. An act of deceiving or tricking someone; elicits a user reaction
  26. 36. A form of fraud where the attackers use spoof calls from legitimate sources
  27. 39. An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
  28. 41. Software that tracks a user’s computer activities