Cyber Corner

1234567891011121314151617
Across
  1. 2. Technique used to impersonate another user or system in order to gain access or hide identity
  2. 3. attack that floods a target with traffic to make it unavailable to users
  3. 8. Type of social engineering attack that uses emails or fake websites to steal personal information
  4. 9. Software designed to harm a computer system or network
  5. 12. Ethical hacker who uses their skills to help identify and fix security vulnerabilities
  6. 14. a method for breaking into a system by trying every possible password combination.
  7. 15. Type of malware designed to hide its presence and maintain privileged access to a computer system
  8. 16. Hidden method of accessing a computer system that bypasses normal authentication procedures
  9. 17. Malware disguised as legitimate software that can give an attacker access to a computer system
Down
  1. 1. a type of malicious software that can encrypt files and demand payment for that release.
  2. 4. a technique used to exploit vulnerabilities in a web application’s database.
  3. 5. Malicious hacker who uses their skills to exploit security vulnerabilities for personal gain or harm
  4. 6. Abbrev. of the attack in which an attacker intercepts communication between two parties and can eavesdrop, modify or inject malicious code into the communication.
  5. 7. Software or device used to intercept and read network traffic
  6. 10. Network of infected computers that are controlled remotely by an attacker
  7. 11. Vulnerability in a computer system or software that is not yet known to the vendor or public
  8. 13. Software or technique that takes advantage of a vulnerability in a computer system or application