Across
- 2. software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
- 4. Phishing but with a voice
- 7. a data storage like a USB stick or external hard drive
- 9. Recording of someones typing
- 10. a cyberattack intended to redirect a website's traffic to another
- 13. software that works with your browser to provide capability the browser may not otherwise have.
- 15. After certain conditions are met The bomb will go off and most likely effect your computer in some way
- 21. Making someone give over the use of your computer to steal personal information
- 22. The allowance of certain privileges' to an employee
- 24. A scam commonly sent through email to convive a victim to sending infromation
- 25. Instructions for a boot process
- 26. The unwanted display of ads
- 27. The act of making a resource or system unavailable
- 28. Remote access over another computer system
- 30. Gaining control of a computer withouth the person or victim knowing
- 31. Emails or text sent by a fake company to get information.
Down
- 1. The exploitation of a bug or flaw in a system to gain better access to resources
- 3. a highly targeted phishing attack aimed at senior executives
- 5. Junk Mail sent in bulk
- 6. somewhat of a fake story sent to someone in order for them to send valuable information
- 8. An unexpected packet similar to a DOS attack
- 11. Power over a system
- 12. an attack retrieved by unproperly dealing with information
- 14. The interception of sensitive data passing through a network
- 15. when an attacker uses charisma to persuade others to do as requested
- 16. an attack meant to shut down a machine or network, making it inaccessible to its intended users.
- 17. The use of scaring someone into doing or completing a task in a short time or period
- 18. The extraction of information from a something like a document
- 19. The threat of taking ones information or making them commit a task
- 20. Forcing an online service to essentially go offline
- 21. Ads that sometimes cause shock to make a victim download a suspecting virus
- 23. The act of someone looking over your shoulder to gain information
- 29. An agreement of two parties too get the goal of trust and security
