Across
- 7. _____ engineering is the manipulation of people to bypass security protocols
- 8. attempting to deceive a user by making them think it is a safe website
- 10. the use if physical identifying information the secure valuables
- 14. a network of computers that relay back to a host with malware
- 15. ____ phishing is personalized phishing attack usually when the target is known
- 16. hacking for a political cause
- 18. a ____ horse is a kind of virus that discusses itself
- 19. an exploit left into the system that allows the user to bypass normal security measures
- 20. a bug found in 2014 that allowed hackers the access unencrypted user information
Down
- 1. ____ theft personal information to impersonate the person
- 2. the part of the CIA triad that ensures the data is readily available when needed
- 3. Malicious software that attaches to other parts of software
- 4. the use of mass email to try and gain information from someone posing as something else
- 5. the part of the CIA triad that ensures that data remains private
- 6. devices installed on credit card that steal the information from the card
- 9. malicious software that keeps track of various activities on the computer
- 11. the part of the CIA triad that ensures that the the data is only access by those who should have access
- 12. the encryption of personal files with the demand that an amount be paid for release
- 13. the use of mass text to try and gain information from someone posing as something else
- 17. Malicious software that works in a similar manner to a virus but works on its own
