MTA Security Fundamentals

12345678910
Across
  1. 3. An attack which redirects a websites traffic to an illegitimate website.
  2. 4. A form of malware that collects personal information
  3. 5. A hardware or software-based device used by attackers to record keystrokes.
  4. 7. A social engineering tactic in which users are asked to supply personal information through a response to an email or through navigating to a website that looks legitimate but is not legitimate.
  5. 8. A possibility of data or systems being compromised.
  6. 9. A computer which becomes part of a Botnet and helps carry out a DDoS.
  7. 10. A logging system used to audit non-Microsoft products.
Down
  1. 1. The default Windows network authentication protocol.
  2. 2. The act of keeping data and systems secure from unauthorized access.
  3. 6. A network full of computers which have been taken over for the purpose of carrying out a DDoS.