Across
- 3. A person who uses hacking techniques for Illegal activities
- 7. Attempting to list all of the servers on a network
- 9. A vulnerability scanner designed specifically for Windows systems
- 11. A virus attack that uses a multimodal approach
- 12. A popular enumeration tool
- 13. Attacker gaining physical access to the machine
- 14. The source code for a program or the act of programming
- 16. A virus that exploits buffer overflows
- 17. Virus scanning that runs when requested by the user
- 18. Software that steals key strokes on a computer
Down
- 1. A person who hacks into phone systems
- 2. Blocking this will prevent a ping scan
- 4. Based on creating a SQL statement that is always true
- 5. A key logger is this type of malware
- 6. The most common way for a virus to spread
- 8. A popular port scanner
- 10. A hole in the security system deliberately left by the creator of the system
- 11. This should be done to all unneeded ports on a firewall to prevent attacks
- 13. Virus scanning that continually runs in the background
- 15. Software loaded onto your machine which causes ads to pop up on your screen.
