Intro to Cyber CH 2

123456789101112
Across
  1. 4. malware designed to modify operating systems to allow unauthorized remote access through a backdoor
  2. 5. malware designed to automatically perform actions over the Internet
  3. 8. any computer code that can be used to steal data, bypass access controls, or harm or compromise a system
  4. 9. an attack that interrupts network services to users, devices, or applications
  5. 11. act of using an exploit against a vulnerability with the goal of breaking into the target system
  6. 12. improper use of practices that manage physical control of equipment, data, or applications
Down
  1. 1. way of gaining access to resources that manipulates individuals into performing actions or divulging confidential information
  2. 2. malicious code that replicates itself independently by exploiting vulnerabilities in networks
  3. 3. after an attack, technique used for ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks
  4. 5. use of multiple techniques to compromise a target
  5. 6. carries out malicious operations while appearing to have a desired function
  6. 7. type of hardware or software defect that malicious users attempt to exploit
  7. 10. malware designed to track the actions of users and capture data