IT

12345678910111213141516171819202122232425262728293031
Across
  1. 2. software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  2. 4. Phishing but with a voice
  3. 7. a data storage like a USB stick or external hard drive
  4. 9. Recording of someones typing
  5. 10. a cyberattack intended to redirect a website's traffic to another
  6. 13. software that works with your browser to provide capability the browser may not otherwise have.
  7. 15. After certain conditions are met The bomb will go off and most likely effect your computer in some way
  8. 21. Making someone give over the use of your computer to steal personal information
  9. 22. The allowance of certain privileges' to an employee
  10. 24. A scam commonly sent through email to convive a victim to sending infromation
  11. 25. Instructions for a boot process
  12. 26. The unwanted display of ads
  13. 27. The act of making a resource or system unavailable
  14. 28. Remote access over another computer system
  15. 30. Gaining control of a computer withouth the person or victim knowing
  16. 31. Emails or text sent by a fake company to get information.
Down
  1. 1. The exploitation of a bug or flaw in a system to gain better access to resources
  2. 3. a highly targeted phishing attack aimed at senior executives
  3. 5. Junk Mail sent in bulk
  4. 6. somewhat of a fake story sent to someone in order for them to send valuable information
  5. 8. An unexpected packet similar to a DOS attack
  6. 11. Power over a system
  7. 12. an attack retrieved by unproperly dealing with information
  8. 14. The interception of sensitive data passing through a network
  9. 15. when an attacker uses charisma to persuade others to do as requested
  10. 16. an attack meant to shut down a machine or network, making it inaccessible to its intended users.
  11. 17. The use of scaring someone into doing or completing a task in a short time or period
  12. 18. The extraction of information from a something like a document
  13. 19. The threat of taking ones information or making them commit a task
  14. 20. Forcing an online service to essentially go offline
  15. 21. Ads that sometimes cause shock to make a victim download a suspecting virus
  16. 23. The act of someone looking over your shoulder to gain information
  17. 29. An agreement of two parties too get the goal of trust and security