Across
- 4. malware designed to modify operating systems to allow unauthorized remote access through a backdoor
- 5. malware designed to automatically perform actions over the Internet
- 8. any computer code that can be used to steal data, bypass access controls, or harm or compromise a system
- 9. an attack that interrupts network services to users, devices, or applications
- 11. act of using an exploit against a vulnerability with the goal of breaking into the target system
- 12. improper use of practices that manage physical control of equipment, data, or applications
Down
- 1. way of gaining access to resources that manipulates individuals into performing actions or divulging confidential information
- 2. malicious code that replicates itself independently by exploiting vulnerabilities in networks
- 3. after an attack, technique used for ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks
- 5. use of multiple techniques to compromise a target
- 6. carries out malicious operations while appearing to have a desired function
- 7. type of hardware or software defect that malicious users attempt to exploit
- 10. malware designed to track the actions of users and capture data
