CHAPTER 9: COMPUTER ATTACKS AND ABUSE

12345678910111213141516171819202122232425
Across
  1. 3. A hacker placing himself between a client and a host to intercept communications between them.
  2. 6. Large amount of data sent to overflow the input memory (buffer) of a program causing it to crash and replaced with attacker’s program instructions.
  3. 7. Programmer instructs the computer to round down all interest calculation to two decimal places. The fraction of a cent that is rounded down on each calculation is put into the programmer’s account or one that he or she controls.
  4. 11. The unauthorized copying or distribution of copyrighted software.
  5. 12. A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.
  6. 14. A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.
  7. 16. Tapping into a communications line and electronically latching onto a legitimate user who unknowingly carries the perpetrator into the system.
  8. 18. Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source
  9. 20. Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient.
  10. 21. Unauthorized access, modification, or use of an electronic device or some element of a computer system.
  11. 23. Malicious code in the form of an SQL query is inserted into input so it can be passed to and executed by an application program.
  12. 24. Driving around looking for unprotected home or corporate wireless networks.
  13. 25. Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal, and destroy data.
Down
  1. 1. Theft of information, trade secrets, and intellectual property.
  2. 2. Using a small device with storage capacity (iPod, flash drive) to download unauthorized data from a computer.
  3. 4. Manipulating the number of times an ad is clicked on to inflate advertising bills.
  4. 5. Programming a computer to dial thousands of phone lines searching for dialup modem lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.
  5. 8. A computer attack in which the attacker sends so many e-mail bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s e-mail server or the web server is overloaded and shuts down.
  6. 9. Trial-and-error method that uses software to guess information, such as the user ID and the password, needed to gain access to a system.
  7. 10. Stealing tiny slices of money from many different accounts.
  8. 13. Hijacked computers (infected machines) that are used to launch a variety of Internet attacks.
  9. 15. Simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something
  10. 17. The person (hackers) who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions.
  11. 19. Gaining access to a system by pretending to be an authorized user.
  12. 22. Gaining control of someone else’s computer to carry out illicit activities without the computer user’s knowledge.