My Topologies
Across
- 4. ___________ is hidden software that monitors and collects information about you and your surfing habits.
- 6. Within cyber security a weakness that can compromise a system is known as a _______
- 7. What tool is used to get through a vulnerability other than the key
- 8. In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
- 11. A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
- 12. the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
- 14. involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
- 15. ____ _________ is when two or more servers have the same information stored on it
- 16. A ________ virus is a program that you are tricked into installing because you thought the application did something useful
- 18. another term used to describe Eavesdropping attacks
- 19. ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
- 1. A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
- 2. What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
- 3. With a _________________ the hacker uses multiple systems to attack a single target system
- 5. the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
- 9. type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
- 10. _______ is the concept of ensuring that system will continue to function after a disaster.
- 13. Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
- 17. What is used when an attacker compromises the network or system through social interaction with an individual