Across
- 1. open web application security program
- 4. tricking users with fake usernames, emails or URLs
- 6. using SMS for phishing attacks
- 9. this control allows roll back to a previous development point
- 10. demands money to unlock yr computer
- 12. stealing information
- 13. retending to be a reputable person / entity to induce the disclorure of sensitive info
- 16. appears a safe program but creates a PC backdoor
- 17. a type of eavesdropping attack by a 3rd party
Down
- 2. redirecting users to false websites that imitate the legitimate URL
- 3. this sneak surfing type observes password entry from "behind" the person
- 5. process of catching things that live in water
- 7. a phishing type target someone with something of value
- 8. 'zombie' computer launching DDoS attacks
- 9. infects host with spam, unwanted ads, hijacks browser, etc
- 11. take advantage of a vulnerability
- 12. a form of mining
- 14. unauthorised computer access
- 15. malicious software
