Cyber Laws and Ethical Hacking ISE-II

1234567891011121314151617181920
Across
  1. 2. Weakness in a system or network
  2. 4. A tool used to capture and analyze network traffic
  3. 5. Internet of Things
  4. 6. Virtual Private Network
  5. 8. An attack that floods a network with traffic to make it unavailable
  6. 9. A process of monitoring and capturing the data packets passing through a given network
  7. 10. A standalone program that can spread to other system
  8. 12. A unique serial number assigned to every network interface on every device
  9. 15. A hidden entry point into a system or network used to by-pass normal authentication procedure
  10. 17. Take advantage of the weak system or network
  11. 18. A server that acts as an intermediary between client and server
  12. 19. A type of malware developed by hackers to gain access to target systems
  13. 20. Internet Protocol
Down
  1. 1. A type of malware that can replicate itself
  2. 3. A device used to prevent unauthorized access
  3. 4. An attack that steals sensitive information by tricking users into providing it
  4. 7. A tool used to guess passwords through trial and error
  5. 11. A technique used to hide the contents of a message
  6. 13. A fraudulent practice in which communication is sent from an unauthorized source and disguised as a known source to the receiver
  7. 14. A device used to lure attackers into a trap
  8. 16. A technique used for collecting as much information as possible about the targeted network to execute a successful cyber attack