My Topologies

12345678910111213141516171819
Across
  1. 4. ___________ is hidden software that monitors and collects information about you and your surfing habits.
  2. 6. Within cyber security a weakness that can compromise a system is known as a _______
  3. 7. What tool is used to get through a vulnerability other than the key
  4. 8. In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
  5. 11. A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
  6. 12. the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
  7. 14. involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
  8. 15. ____ _________ is when two or more servers have the same information stored on it
  9. 16. A ________ virus is a program that you are tricked into installing because you thought the application did something useful
  10. 18. another term used to describe Eavesdropping attacks
  11. 19. ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
  1. 1. A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
  2. 2. What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
  3. 3. With a _________________ the hacker uses multiple systems to attack a single target system
  4. 5. the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
  5. 9. type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
  6. 10. _______ is the concept of ensuring that system will continue to function after a disaster.
  7. 13. Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
  8. 17. What is used when an attacker compromises the network or system through social interaction with an individual