Unit 32 How networks can be attacked

123456789
Across
  1. 3. Is a type of malicious software that is activated each time your system boots up
  2. 5. Know as malicious software
  3. 6. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
  4. 7. of service It attempts to make a user or organisation lose its services
  5. 8. Also known for advertising supported software
  6. 9. force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
Down
  1. 1. Usually these are statistical analyses that attempt to discover keys
  2. 2. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
  3. 4. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
  4. 6. Is a software that gathers information about a person or organisation without their knowledge
  5. 9. door Is a method where any virus such Trojan, Malware can get through all security procedures