SN33003FP Chapter 3

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
Across
  1. 3. Applications without malware, but still risky, significant issue in MOBILE SECURITY.
  2. 7. Retrieving documents from the TRASH or recycle bin.
  3. 10. Software program that RECORDS THE KEYSTROKES of the user.
  4. 12. Phishing attack that targets SENIOR EXECUTIVES (e.g. CEO, CFO etc).
  5. 15. Displays annoying pop-ups to GENERATE REVENUE for its authors.
  6. 16. Misdirects users to a FAKE WEBSITE to get user credentials.
  7. 18. Attacker INTERCEPTS communication between computers to steal information travelling across the network.
  8. 24. Uses SEO techniques to make a malicious website appear higher in SEARCH RESULTS.
  9. 25. Use of DECEPTION to elicit a user's irrational action.
  10. 26. Malicious code that installs copies of itself in the memory of an infected computer and SPREADS across the network.
  11. 27. Overwhelms the network with LARGE VOLUME OF TRAFFIC, denying access to authorized users.
  12. 29. Uses VOICE communication technology to try and gather information such as login credentials by masquerading as a reputable person.
  13. 30. Submits excessive data OVERFILLING THE MEMORY designed to receive the input.
  14. 31. Modifies the operating system to create a backdoor, BYPASSING normal authentication to access a system.
  15. 32. PRETENDING to be someone else to gain trust or access to unauthorized areas or data.
  16. 36. UNSOLICITED EMAIL or JUNK MAIL to send advertisements, harmful links, malware, or deceptive content.
  17. 40. Completely NON-TECHNICAL means to gather information by manipulating individuals.
  18. 41. Malicious code that holds a computer system, or the data it contains, CAPTIVE until the target makes a payment.
  19. 42. Enables a criminal to obtain information about a user's computer activities.
  20. 43. EAVESDROPS all network traffic as it passes through the network, even when it is not addressed to the attacker.
  21. 44. Attacker OBSERVES victims enter sensitive information like PINs or credit card numbers.
  22. 45. An attacker calls an individual and LIES to them in an attempt to gain access to privileged data.
  23. 46. IMPERSONATION attack to take advantage of the trust between two systems.
Down
  1. 1. Exploits the failure to validate DATABASE QUERIES.
  2. 2. Malware that carries malicious operations under the DISGUISE of a desired operation such as an online game.
  3. 4. Attacker COPIES the victim's information (e.g. emails and contact lists) from his device.
  4. 5. Trickery Forwarding hoax emails and other non-work-related content at work, potentially violating company policies.
  5. 6. Criminal TAGS ALONG with an authorized person to gain entry to a secure location or a restricted area.
  6. 8. Similar to a DoS attack, but it originates from MULTIPLE coordinated sources.
  7. 9. Malicious code ATTACHED to a program that requires a host program to run and executes harmful functions on a computer.
  8. 11. Plugins Hackers can exploit a browser's executable file, components, or plugins to cause system crashes or take control.
  9. 13. Exploits UNKNOWN/UNDISCLOSED software vulnerabilities by the software vendor.
  10. 14. and WPA Attacks Exploits vulnerabilities in wireless security protocols.
  11. 17. Exploits remote host by installing malicious program PLUGINS.
  12. 19. Attacker SENDS unauthorized messages to another Bluetooth device.
  13. 20. Establishes REMOTE ACCESS to a program, service or device.
  14. 21. Malware that modifies a computer's browser settings to REDIRECT the user to malicious websites.
  15. 22. Attacker injects a MALICIOUS SCRIPT into websites viewed by the victim.
  16. 23. Uses FAKE TEXT MESSAGES to trick users into visiting a website or calling a phone number.
  17. 28. (Quid pro quo) Attacker requests personal information from a party IN EXCHANGE FOR SOMETHING, like a gift.
  18. 33. Uses email or other social media to try to gather information such as login credentials by MASQUERADING as a reputable person.
  19. 34. DISRUPTS the transmission of a radio or satellite station so that the signal does not reach the receiving station.
  20. 35. Wireless access point installed on a secure network WITHOUT AUTHORIZATION.
  21. 37. Malicious program that uses a TRIGGER to awaken the malicious code, causing harm to a computer once activated.
  22. 38. A highly targeted phishing attack that sends customized emails to a SPECIFIC PERSON.
  23. 39. Persuades the user to take a specific action based on FEAR.