Across
- 2. attacks against cryptographic implementations or crypto algorithms
- 4. group of compromised computers known as robots
- 5. code that can run on a computer without any action from the user, self-replicating
- 9. master computer that controls the botnet
- 11. malware that occurs in memory of computer
- 12. in the clear
- 13. malware that restricts access to a system or encrypts files and demands payment
- 15. malicious software downloaded unwittingly from a website or installed with some third-party software
- 16. an attack on a hashing system that attempts to send two different messages for the same hash
- 18. list of encrypted passwords located in a lookup table
- 20. attacker captures credit card information from a cardholder
- 22. attacker uses this to bypass normal authorization
- 23. advanced form of ransomware that leverages advanced encryption techniques
- 25. spyware that records your keystrokes
- 26. software designed to gain administrator-level control over a computer system without being detected
- 27. code added to software that will initiate when something specific happens
Down
- 1. password attack where every possible password is attempted
- 3. form of spyware that includes grayware, adware or jokes
- 6. attack when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
- 7. password attack uses a prearranged list of ordinary words
- 8. malicious software
- 10. software appears to perform a desired function but actually is performing malicious functions behind the scenes
- 12. password attack where attacker uses simple passwords against targeted user accounts and moves on to other accounts before being detected
- 14. type of attack where attackers target security weaknesses in the supply network
- 17. attacker clones a credit card or SIM card
- 19. computer used to distribute malware across the internet, also a zombie
- 21. two different files end up using the same hash, MD5
- 24. a trojan used to gain back-end access to a server
