My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Threats & Attacks on Endpoints Mod 3

Horizontales
Another category of attacks look for vulnerabilities in applications or manipulate applications in order to compromise them
Any unauthorized access to data, applications, or servers
On demand computer services hosted by a third party (AWS, Microsoft Azure)
Changing plaintext to cipher text using an algorithm
An ___injection attack that inserts statements to manipulate a database server using commands
Attacks that introduce new input to exploit a vulnerability
Type of malware that self-replicates in attempts to steal information
A buffer overflow attack occurs when a process attempts to store data in ___ beyond the boundaries of a fixed-length storage buffer
A type of network that allows for secure access to a network from off-site
An attack that takes advantage of a website that accepts user input without validating it.
Prevention of authorized access by overloading system resources (3 words)
A type of malware (virus) that takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks.
A generic term for any type of malicious software
Logical or physical tool used to filter network traffic
An executable program that masquerades as performing a benign activity but also does something malicious
Emails sent with the intention of stealing money or account credentials
Malicious program that uses a computer network to replicate.
Verticales
Malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid
Malware that gives access to a computer, program, or service that circumvents any normal security protections.
Large number of compromised computers used to send spam or denial of service attacks
Hardware or software that silently captures and stores each keystroke that a user types on the computer's keyboard
An infected computer placed under the remote control of an attacker for the purpose of launching attacks.
attacks are commonly used against digital identities
Using physical characteristics to provide access (i.e. fingerprint scanner)
An attack that takes advantage of a trusting relationship between web servers.
A type of malware that encrypts a user's files, then asks for payment to unlock them
Small software update provided by a manufacturer to fix bugs
An attack that takes advantage of an authentication “token” that a website sends to a user’s web browser to imitate the identity and privileges of the victim.
Transparently adding a small coding library that intercepts calls made by a device and changes the parameters passed between the device and the device driver
Malware that infects a computer like a Trojan but also gives the threat agent unauthorized remote access to the victim’s computer by using specially configured communication protocols.
A type of computer that provides files/services for other computers
A tool provided by CWRU to generate and manage secure passwords
is defined as “teaching” a technology device to “learn” by itself without the continual instructions of a computer programmer
Any unwanted/unsolicited email or phone call
The multi-factor authentication tool provided by CWRU