Module 3 Puzzle

123456789101112131415161718
Across
  1. 3. A person who uses hacking techniques for Illegal activities
  2. 7. Attempting to list all of the servers on a network
  3. 9. A vulnerability scanner designed specifically for Windows systems
  4. 11. A virus attack that uses a multimodal approach
  5. 12. A popular enumeration tool
  6. 13. Attacker gaining physical access to the machine
  7. 14. The source code for a program or the act of programming
  8. 16. A virus that exploits buffer overflows
  9. 17. Virus scanning that runs when requested by the user
  10. 18. Software that steals key strokes on a computer
Down
  1. 1. A person who hacks into phone systems
  2. 2. Blocking this will prevent a ping scan
  3. 4. Based on creating a SQL statement that is always true
  4. 5. A key logger is this type of malware
  5. 6. The most common way for a virus to spread
  6. 8. A popular port scanner
  7. 10. A hole in the security system deliberately left by the creator of the system
  8. 11. This should be done to all unneeded ports on a firewall to prevent attacks
  9. 13. Virus scanning that continually runs in the background
  10. 15. Software loaded onto your machine which causes ads to pop up on your screen.