Across
- 3. A hacker placing himself between a client and a host to intercept communications between them.
- 6. Large amount of data sent to overflow the input memory (buffer) of a program causing it to crash and replaced with attacker’s program instructions.
- 7. Programmer instructs the computer to round down all interest calculation to two decimal places. The fraction of a cent that is rounded down on each calculation is put into the programmer’s account or one that he or she controls.
- 11. The unauthorized copying or distribution of copyrighted software.
- 12. A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.
- 14. A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.
- 16. Tapping into a communications line and electronically latching onto a legitimate user who unknowingly carries the perpetrator into the system.
- 18. Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source
- 20. Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient.
- 21. Unauthorized access, modification, or use of an electronic device or some element of a computer system.
- 23. Malicious code in the form of an SQL query is inserted into input so it can be passed to and executed by an application program.
- 24. Driving around looking for unprotected home or corporate wireless networks.
- 25. Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal, and destroy data.
Down
- 1. Theft of information, trade secrets, and intellectual property.
- 2. Using a small device with storage capacity (iPod, flash drive) to download unauthorized data from a computer.
- 4. Manipulating the number of times an ad is clicked on to inflate advertising bills.
- 5. Programming a computer to dial thousands of phone lines searching for dialup modem lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.
- 8. A computer attack in which the attacker sends so many e-mail bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s e-mail server or the web server is overloaded and shuts down.
- 9. Trial-and-error method that uses software to guess information, such as the user ID and the password, needed to gain access to a system.
- 10. Stealing tiny slices of money from many different accounts.
- 13. Hijacked computers (infected machines) that are used to launch a variety of Internet attacks.
- 15. Simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something
- 17. The person (hackers) who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions.
- 19. Gaining access to a system by pretending to be an authorized user.
- 22. Gaining control of someone else’s computer to carry out illicit activities without the computer user’s knowledge.
