Cybersecurity Unit 8
Across
- 3. multiple systems under the control of the attacker are used in a coordinated attack
- 5. this type of hacker does not have permission and hacking in a criminal manner
- 7. opens a secure connection with another computer
- 8. An attack that prevents a system or server from functioning normally
- 10. opens a port to listen to incoming connections
- 12. this type of access point is installed on a secure network without explicit authorization
- 13. displays the IP address for the device
- 14. sends packets to another device to test connectivity
- 15. testing the effectiveness of security controls or find vulnerabilities in software
- 17. this type of attack is where the victim connects to a rogue access point instead of the legitimate one
- 19. does defensive pentesting
- 20. this hacker often has good intentions, but they don't have permission to hack
- 21. a tool that disguises your actual IP address and encrypts internet traffic between a device and a server
Down
- 1. this type of hacker has good intentions and received permission to hack
- 2. pulling email, contacts, passwords and other data off the device
- 4. an attack where the attacker poses as another by falsifying data to gain access to target systems
- 6. a technology that allows computers to remember IP addresses with their corresponding domain names
- 9. eavesdropping on messages
- 11. tool to monitor incoming and outgoing network connections
- 16. does offensive pentesting
- 18. spying on your device by gaining access and then installing a backdoor for future access
- 19. pushing unsolicited messages onto a device using Bluetooth