Across
- 3. Applications without malware, but still risky, significant issue in MOBILE SECURITY.
- 7. Retrieving documents from the TRASH or recycle bin.
- 10. Software program that RECORDS THE KEYSTROKES of the user.
- 12. Phishing attack that targets SENIOR EXECUTIVES (e.g. CEO, CFO etc).
- 15. Displays annoying pop-ups to GENERATE REVENUE for its authors.
- 16. Misdirects users to a FAKE WEBSITE to get user credentials.
- 18. Attacker INTERCEPTS communication between computers to steal information travelling across the network.
- 24. Uses SEO techniques to make a malicious website appear higher in SEARCH RESULTS.
- 25. Use of DECEPTION to elicit a user's irrational action.
- 26. Malicious code that installs copies of itself in the memory of an infected computer and SPREADS across the network.
- 27. Overwhelms the network with LARGE VOLUME OF TRAFFIC, denying access to authorized users.
- 29. Uses VOICE communication technology to try and gather information such as login credentials by masquerading as a reputable person.
- 30. Submits excessive data OVERFILLING THE MEMORY designed to receive the input.
- 31. Modifies the operating system to create a backdoor, BYPASSING normal authentication to access a system.
- 32. PRETENDING to be someone else to gain trust or access to unauthorized areas or data.
- 36. UNSOLICITED EMAIL or JUNK MAIL to send advertisements, harmful links, malware, or deceptive content.
- 40. Completely NON-TECHNICAL means to gather information by manipulating individuals.
- 41. Malicious code that holds a computer system, or the data it contains, CAPTIVE until the target makes a payment.
- 42. Enables a criminal to obtain information about a user's computer activities.
- 43. EAVESDROPS all network traffic as it passes through the network, even when it is not addressed to the attacker.
- 44. Attacker OBSERVES victims enter sensitive information like PINs or credit card numbers.
- 45. An attacker calls an individual and LIES to them in an attempt to gain access to privileged data.
- 46. IMPERSONATION attack to take advantage of the trust between two systems.
Down
- 1. Exploits the failure to validate DATABASE QUERIES.
- 2. Malware that carries malicious operations under the DISGUISE of a desired operation such as an online game.
- 4. Attacker COPIES the victim's information (e.g. emails and contact lists) from his device.
- 5. Trickery Forwarding hoax emails and other non-work-related content at work, potentially violating company policies.
- 6. Criminal TAGS ALONG with an authorized person to gain entry to a secure location or a restricted area.
- 8. Similar to a DoS attack, but it originates from MULTIPLE coordinated sources.
- 9. Malicious code ATTACHED to a program that requires a host program to run and executes harmful functions on a computer.
- 11. Plugins Hackers can exploit a browser's executable file, components, or plugins to cause system crashes or take control.
- 13. Exploits UNKNOWN/UNDISCLOSED software vulnerabilities by the software vendor.
- 14. and WPA Attacks Exploits vulnerabilities in wireless security protocols.
- 17. Exploits remote host by installing malicious program PLUGINS.
- 19. Attacker SENDS unauthorized messages to another Bluetooth device.
- 20. Establishes REMOTE ACCESS to a program, service or device.
- 21. Malware that modifies a computer's browser settings to REDIRECT the user to malicious websites.
- 22. Attacker injects a MALICIOUS SCRIPT into websites viewed by the victim.
- 23. Uses FAKE TEXT MESSAGES to trick users into visiting a website or calling a phone number.
- 28. (Quid pro quo) Attacker requests personal information from a party IN EXCHANGE FOR SOMETHING, like a gift.
- 33. Uses email or other social media to try to gather information such as login credentials by MASQUERADING as a reputable person.
- 34. DISRUPTS the transmission of a radio or satellite station so that the signal does not reach the receiving station.
- 35. Wireless access point installed on a secure network WITHOUT AUTHORIZATION.
- 37. Malicious program that uses a TRIGGER to awaken the malicious code, causing harm to a computer once activated.
- 38. A highly targeted phishing attack that sends customized emails to a SPECIFIC PERSON.
- 39. Persuades the user to take a specific action based on FEAR.
