Across
- 3. able to replicate itself from system to system with NO user interaction
- 8. type of attack that seeks to overwhelm system resources
- 9. often sits quietly watching everything you do
- 10. pretending to be someone you are not to gain network or system access
- 11. tricks user into running an application because they think it will do one thing but actually performs some other malicious function
- 12. bad guys may go after a specific organization or individual
- 13. using people to get around security techniques
- 15. able to replicate itself from system to system by a user running an application
Down
- 1. someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized
- 2. holds your system hostage until you pay money
- 4. broad category of malicious software
- 5. standing over someone's shoulder to view what's on their computer
- 6. using every possible password combination until the right one is found
- 7. attack using common or well known words until the right password is found
- 14. hides itself from the operating system and is invisible to anti-virus and anti-malware applications too
