Across
- 2. Technique used to impersonate another user or system in order to gain access or hide identity
- 3. attack that floods a target with traffic to make it unavailable to users
- 8. Type of social engineering attack that uses emails or fake websites to steal personal information
- 9. Software designed to harm a computer system or network
- 12. Ethical hacker who uses their skills to help identify and fix security vulnerabilities
- 14. a method for breaking into a system by trying every possible password combination.
- 15. Type of malware designed to hide its presence and maintain privileged access to a computer system
- 16. Hidden method of accessing a computer system that bypasses normal authentication procedures
- 17. Malware disguised as legitimate software that can give an attacker access to a computer system
Down
- 1. a type of malicious software that can encrypt files and demand payment for that release.
- 4. a technique used to exploit vulnerabilities in a web application’s database.
- 5. Malicious hacker who uses their skills to exploit security vulnerabilities for personal gain or harm
- 6. Abbrev. of the attack in which an attacker intercepts communication between two parties and can eavesdrop, modify or inject malicious code into the communication.
- 7. Software or device used to intercept and read network traffic
- 10. Network of infected computers that are controlled remotely by an attacker
- 11. Vulnerability in a computer system or software that is not yet known to the vendor or public
- 13. Software or technique that takes advantage of a vulnerability in a computer system or application
