Cybersecurity Fundamental Chapter 3 Part 2
Across
- 1. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
- 6. one man's trash is another man's treasure
- 11. use short message service (sms) to send fake text messages
- 12. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
- 13. application that behave in an annoying or undesirable manner.
- 14. impersonation attack, and it takes advantage of a trusted relationship between two systems.
- 15. criminal tags along with an authorized person to gain entry into a secured location.
Down
- 2. looking over one's shoulder to get their pin or access code.
- 3. an attacker requests personal information from a party in exchange for something like a gift.
- 4. intercepting communication between computers to steal information crossing the network.
- 5. action of pretending to be someone else
- 7. non-technical means for a criminal to gather information on a target.
- 8. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
- 9. examines all network traffic as it passes through their Network Interface Card (NIC).
- 10. records or logs the keystrokes of the user of the system.