Unit 32 How networks can be attacked
Across
- 3. Is a type of malicious software that is activated each time your system boots up
- 5. Know as malicious software
- 6. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- 7. of service It attempts to make a user or organisation lose its services
- 8. Also known for advertising supported software
- 9. force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
Down
- 1. Usually these are statistical analyses that attempt to discover keys
- 2. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
- 4. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
- 6. Is a software that gathers information about a person or organisation without their knowledge
- 9. door Is a method where any virus such Trojan, Malware can get through all security procedures