Across
- 1. A sudden and unintended failure
- 4. Software that monitors computer usage
- 6. Software that appears to have a valid and benign purpose but actually has another nefarious purpose
- 8. Using the Internet to defraud someone
- 10. The response a server sends back to a connection request from a client
- 12. An address used to test a machine’s own network card,127.0.0.1
- 13. A type of attack against a TCP/IP stack based on using fragmented packets
- 15. An attack that involves loading a buffer with more data than it is designed to hold
- 16. A term for a seller putting in fake bids on his own item to drive up the price
- 17. The process of collecting enough personal information on someone so that you might pose as that person.
- 18. A numerical designation for a connection point on a computer
Down
- 2. Using interpersonal skills to extract information about a computer system and its security
- 3. Using the Internet to harass someone
- 5. Hacking conducted for ideological purposes
- 7. A method to prevent denial-of-service attacks that actually uses a type of cookie to authenticate the client’s connection
- 9. The act of encrypting a message
- 10. A DOS attack in which the target is flooded with connection requests
- 11. To send an extremely large packet to a target. For some older systems, this would cause the target to crash
- 14. Phony email spoofing legitimate email to steal information
- 16. A specific type of distributed denial-of-service attack
