Across
- 9. a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad
- 10. Monitors the type of websites visited to generate targeted advertisements
- 12. Occurs when a user identifies himself to the system, and the identity is verified against an authentication database.
- 13. The process of using or manipulating people inside the network environment to gain access to that network from the outside
- 15. Low-level operating trojan horse
- 16. A person goes through garbage to find personal information
- 17. A virus is a program that has two jobs: to replicate and to activate
- 20. Software utility that detects, prevents, and removes viruses, worms, and other malware from a computer
Down
- 1. A rogue access point is an unauthorized Wireless Access Point (WAP) installed on the network
- 2. after the user is authenticated, he is then granted access to resources or services on the network.
- 3. A rogue access point that looks like a legitimate access point
- 4. Program or code that does something on a system or network you don’t want happening
- 5. Sends information about your system or your actions over the internet
- 6. Protects networks from potential attacks from outside your network by filtering packets using a number of methods
- 7. An attacker poses as some sort of trusted site
- 8. It is a firewall tool that prevents the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator.
- 11. Using another person’s wireless network without permission
- 14. When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people.
- 18. Embedded on a program file. Once opened, the virus runs automatically wreaking havoc
- 19. Similar to a virus, but doesn’t need activation to replicate
