Network Security
Across
- 1. A type of penetration testing that mimics an external attack on the system. (5,3)
- 4. This type of malware appears to be legitimate, like a game, but is actually harmful.
- 5. A type of malware that locks a device and demands a fee to unlock it.
- 6. A type of attack where someone monitors data traveling on a network to intercept sensitive information.
- 7. A technique where cybercriminals send messages disguised as from a trusted source to steal personal data.
- 9. A method to prevent unauthorized access to data by translating it into code that only someone with the correct key can access.
Down
- 1. An attack that uses automated software to produce hundreds of likely passwords to gain access to accounts. (5,5)
- 2. A type of malware that self-replicates and attaches to another file or program.
- 3. A type of attack where a server is flooded with useless traffic, causing it to slow down or become unusable.(6,2,7)
- 8. A type of social engineering attack where the attacker watches the victim over their shoulder to gain personal information.