Unit 32 How networks can be attacked

12345678910
Across
  1. 4. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
  2. 5. Is a software that gathers information about a person or organisation without their knowledge
  3. 6. Is a type of malicious software that is activated each time your system boots up
  4. 7. It attempts to make a user or organisation lose its services
  5. 9. Usually these are statistical analyses that attempt to discover keys
Down
  1. 1. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
  2. 2. Know as malicious software
  3. 3. Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
  4. 5. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
  5. 8. Is a method where any virus such Trojan, Malware can get through all security procedures
  6. 10. Also known for advertising supported software