Types of Hacking Attacks
Across
- 3. Changing IP addresses in DNS servers so that users are directed to fake websites
- 4. In a..... attack, multiple compromised computer systems flood a target device like a webserver with bad connection requests, causing the device to slow or crash
- 7. A ..... attack is where attackers intercept communications between two devices for the purpose of stealing passwords, credit card numbers, etc.
- 8. This is when an attack is carried out by an employee or someone working inside an organization
- 9. A ....secretly monitors and logs a users keystrokes to capture passwords, PIN codes and other confidential information
- 10. Changing the URL used to access a website to see if access can be gained to confidential information
Down
- 1. This type of attack uses malicious database requests to steal user information from website databases
- 2. In a ........ attack, a legitimate but insecure website trusted by users is infected with malicious code so that visitors to the site are infected.
- 5. In a.... attack, the hacker uses a preselected library of commonly used words and phrases to try to crack passwords
- 6. a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals to perform cyberattacks