Network Attacks
Across
- 2. A hidden access point in a system that bypasses normal authentication, often created by attackers or poorly secured software.
- 3. Attack A method that exploits weaknesses in encryption algorithms or security protocols using advanced mathematical techniques.
- 4. Software that automatically displays or downloads unwanted advertising, often bundled with free programs.
- 7. Self-replicating malware that spreads across networks without user intervention.
- 8. Malicious software disguised as legitimate programs to trick users into installing them.
- 9. An attack where an intruder disguises their identity by faking IP addresses, emails, or websites to trick users or systems.
- 10. Malicious tools that hide the presence of other malware and give attackers persistent administrative access to a system.
Down
- 1. An attack that takes advantage of bugs or vulnerabilities in software to gain unauthorized access or control.
- 5. A trial-and-error attack that systematically attempts all possible passwords or keys until the correct one is found.
- 6. Malicious programs that attach to files or applications and spread when the infected files are executed.
- 9. Software that secretly monitors and collects user activity or data without consent.