You are on page 1of 3

Name:

Computer Attacks & Abuse


Complete the crossword puzzle below
1 2

3 4 5

7 8

10 11 12

13

14

15

16

17

18

19

20

Created using the Crossword Maker on TheTeachersCorner.net


Across Down
6. Using telephone lines to transmit viruses and to access, steal, and 1. A hacker placing himself between a client and a host to intercept
destroy data network traffic
7. E-mailing an unsolicited message to many people at the same time 2. Searching for modems on unprotected phone lines in order to access
10. Inflating advertising revenue by clicking online ads numerous times the attached computer and gain access to the network(s) to
12. A link containing malicious code that takes a victim to a vulnerable 3. Copying company data, such as computer files, without permission
Web site where the victim’s browser executes the malicio 4. Overloading an Internet service provider’s e-mail server by sending
13. Gaining access to a computer system without permission hundreds of e-mail messages per second from randomly gene
14. Capturing and decrypting passwords to gain access to a system 5. Using a wireless network without permission
16. Inserting a malicious database query in input in a way that it can be 8. Pretending to be a legitimate user, thereby gaining access to a
executed by an application program system and all the rights and privileges of the legitimate us
18. Unauthorized copying or distribution of copyrighted software 9. Gaining control of a computer to carry out unauthorized illicit activities
19. Making an e-mail look like it came from someone else 11. A demand for payment to ensure a hacker does not harm a
20. Altering data before or during entry into a computer system computer
15. Embezzling small fractions of funds over time
17. A spam blog that promotes affiliated Web sites to increase their
Google PageRank
Name:

Social Engineering
Complete the crossword puzzle below
1 2

9 10

11 12

13

14

15

Created using the Crossword Maker on TheTeachersCorner.net


Across Down
4. Intercepting and/or listening in on private voice and data 1. Illegally obtaining confidential information, such as a Social Security
transmissions number, about another person so that it can be used f
5. Diverting traffic from a legitimate Web site to a hacker’s Web site to 2. Creating a seemingly legitimate business, collecting personal
gain access to personal and confidential information information while making a sale, and never delivering the item
6. Secretly changing an already open browser tab 3. Searching through garbage for confidential data
7. Creating Web sites with names similar to real Web sites so users 8. A rogue wireless access point masquerading as a legitimate access
making errors while entering a Web site name are sent to a h point
11. Observing or listening to users as they divulge personal information 9. Acting under false pretenses to gain confidential information
14. E-mails that look like they came from a legitimate source but are 10. Inserting a chip that captures financial data in a legitimate credit card
actually from a hacker who is trying to get the user to div reader
15. Verifying credit card validity 12. Covertly swiping a credit card in a card reader that records the data
for later use
13. E-mails instructing a user to call a phone number where they are
asked to divulge personal information
Name:

Malware
1 2 3

5 6

8 9

10

11

12

13

14

15

16

Created using the Crossword Maker on TheTeachersCorner.net


Across Down
1. Use of spyware to record a user’s keystrokes 2. Software that encrypts programs and data until a payment is made to
4. Software that monitors and reports a user’s computing habits remove it
8. Entering a system using a back door that bypasses normal system 3. Software used to do harm
controls 5. A segment of executable code that attaches itself to software
9. Malicious software that people are frightened into buying 6. A program that can replicate itself and travel over networks
13. Intercepting Internet and other network transmissions 7. Unauthorized code in an authorized and properly functioning program
16. Capturing data from devices that use Bluetooth technology 9. Concealing data within a large MP3 file
10. Making phone calls and sending text messages using another user’s
phone without physically holding that phone
11. Special software used to bypass system controls
12. Software that sits idle until a specified circumstance or time triggers
it
14. Software that conceals processes, files, network connections, and
system data from the operating system and other programs
15. Software that collects consumer surfing and purchasing data

You might also like