Attack Types

1234567891011121314151617181920212223
Across
  1. 2. interception of a conversation
  2. 4. attaches itself to opened programs
  3. 5. self-replicates across a network
  4. 7. holds data until a fee is paid
  5. 9. recording keystrokes done by the user
  6. 10. bypassing authentication
  7. 11. inserting malicious code into a database
  8. 12. overwhelming a system with traffic
  9. 13. changes its code
  10. 16. hides admin access
  11. 18. memory flooding attack
  12. 19. cross-site scripting
  13. 20. malicious code that activates when something triggers it or a date is reached
  14. 22. secretly monitors user's actions
  15. 23. password guessing
Down
  1. 1. horses disguised as a helpful tool
  2. 3. categories of system weaknesses
  3. 6. a trojan infecting a web browser
  4. 8. generally used hacking strategies
  5. 14. tricking humans
  6. 15. weaknesses within a system
  7. 17. attack taking advantage of unsolved patches
  8. 21. pop-up ads