Module 2 Puzzle

123456789101112131415161718
Across
  1. 1. A sudden and unintended failure
  2. 4. Software that monitors computer usage
  3. 6. Software that appears to have a valid and benign purpose but actually has another nefarious purpose
  4. 8. Using the Internet to defraud someone
  5. 10. The response a server sends back to a connection request from a client
  6. 12. An address used to test a machine’s own network card,127.0.0.1
  7. 13. A type of attack against a TCP/IP stack based on using fragmented packets
  8. 15. An attack that involves loading a buffer with more data than it is designed to hold
  9. 16. A term for a seller putting in fake bids on his own item to drive up the price
  10. 17. The process of collecting enough personal information on someone so that you might pose as that person.
  11. 18. A numerical designation for a connection point on a computer
Down
  1. 2. Using interpersonal skills to extract information about a computer system and its security
  2. 3. Using the Internet to harass someone
  3. 5. Hacking conducted for ideological purposes
  4. 7. A method to prevent denial-of-service attacks that actually uses a type of cookie to authenticate the client’s connection
  5. 9. The act of encrypting a message
  6. 10. A DOS attack in which the target is flooded with connection requests
  7. 11. To send an extremely large packet to a target. For some older systems, this would cause the target to crash
  8. 14. Phony email spoofing legitimate email to steal information
  9. 16. A specific type of distributed denial-of-service attack