Across
- 3. using common or well known words until the right password is discovered
- 6. using every possible password combination until the right one is discovered
- 8. broad category of malicious software
- 10. standing over someone's shoulder to view what's on their screen
- 11. able to replicate itself from system to system with NO user interaction
- 13. type of attack that seeks to overwhelm system resources
- 14. when hackers target a specific group of people or organization
- 15. sits quietly watching everything you do
Down
- 1. hides itself from the operating system and is invisible to anti-virus and anti-malware solutions
- 2. using people to get around security controls
- 4. someone who is not authorized to enter a particular area does so by following behind someone who is authorized
- 5. tricks users into running an application because they think it will do one thing but actually performs some other malicious function
- 7. able to replicate itself from system to system when a user runs an application
- 9. pretending to be someone you are not to gain network or system access
- 12. holds your system hostage until you pay money
