Methods of attack
Across
- 2. involves the use of packet sniffers to intercept data packets on a network, which are then analysed. For example, sensitive data such as login names, passwords and credit card numbers can be stolen.
- 4. Exploits personal and financial data held on websites (such as social networking sites, banks and online commerce) stored in huge databases.
Down
- 1. Overloads a network or website by flooding it with network communications such as login requests. For example, malware can be used to take control of lots of computers that will all send information and login requests at the same time.
- 3. General attacks that need little special knowledge or techniques. For example, automated software is used to try millions of different passwords.