Across
- 2. Can be started by a person who is fraudulently representing himself or herself or an institution
- 9. A scam designed to convince users to give up important information or money for an interesting offer.
- 10. Having a good ___________ program installed and running prevents most of these types of attacks from affecting you, your files, and your computer.
- 11. Social engineering attacks can be prevented with effective user __________
- 12. attack is the simplest type of password attack and involves an individual making repeated attempts to guess a password by entering different common password values, such as the user's name, a spouse's name, or a significant date.
- 14. Piece of code that spreads from one computer to another by attaching itself to other files
- 15. A term that always represents a malicious system intruder.
Down
- 1. A hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose
- 3. You can install software and __________ the information on all of these portable devices to make it more difficult for the thieves to access the information contained on the devices.
- 4. In a __________ attack, the attacker sends an email that seems to come from a respected bank or other financial institution.
- 5. Human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.
- 6. By properly disposing of paper and hardware, you can protect your organization from ___________ divers.
- 7. Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.
- 8. A security threat that can destroy hardware and therefore the data contained in it
- 13. Email-based threat that presents various advertising materials, promotional content, or get-rich-quick schemes to users.
