Security Threats

123456789101112131415
Across
  1. 3. able to replicate itself from system to system with NO user interaction
  2. 8. type of attack that seeks to overwhelm system resources
  3. 9. often sits quietly watching everything you do
  4. 10. pretending to be someone you are not to gain network or system access
  5. 11. tricks user into running an application because they think it will do one thing but actually performs some other malicious function
  6. 12. bad guys may go after a specific organization or individual
  7. 13. using people to get around security techniques
  8. 15. able to replicate itself from system to system by a user running an application
Down
  1. 1. someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized
  2. 2. holds your system hostage until you pay money
  3. 4. broad category of malicious software
  4. 5. standing over someone's shoulder to view what's on their computer
  5. 6. using every possible password combination until the right one is found
  6. 7. attack using common or well known words until the right password is found
  7. 14. hides itself from the operating system and is invisible to anti-virus and anti-malware applications too