In-Seat Assgiment W3

123456789101112131415161718192021222324
Across
  1. 3. Phishing attack variation that Targeting wealthy individuals
  2. 8. Short-range ad-hoc “on-the –fly” wireless pairing technology.
  3. 11. Also known as piggybacking, is the act of following behind an authorized individual through an access door
  4. 12. The use of hiding data within other fil
  5. 14. Unsolicited e-mail
  6. 16. Only approved individuals may access information
  7. 20. A false warning, usually claiming to come from the IT department
  8. 22. Prove that Information is correct and unaltered
  9. 23. General term Malicious software
Down
  1. 1. A software that gathers information without user consent
  2. 2. Information is accessible to authorized users
  3. 4. Phishing attack variation that automatically redirects user to a fraudulent Web site
  4. 5. making an illicit copy of a transmission before sending it to the original recipient
  5. 6. An infected computer that is under the remote control of an attacker
  6. 7. Flaw or weakness that allows a threat agent to bypass security
  7. 9. Introducing information to harm or destroy a network.
  8. 10. An attacker whose motivation may be ideological or for the sake of principles or beliefs.
  9. 13. file that store user-specific information on user’s local computer
  10. 15. Item that has value
  11. 17. Use to hide inside security details to outsiders
  12. 18. An executable program that does something other than advertised
  13. 19. agent A person or element with power to carry out a threat
  14. 21. A situation that involves exposure to some type of danger.
  15. 24. Malicious program that uses a computer network to replicate