CHAPTER 14 CROSSWORD

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
Across
  1. 6. programs that ping every port on the target to identify which ports are open
  2. 7. an attack which the device is damaged and must be replaced. Also attacks the firmware located in many systems.
  3. 12. a DoS attack that inundates the receiving machines with lots of packets that cause the victim to waste resources by holding connections open.
  4. 13. a huge invasion at the root level, followed with a DoS attack finale.
  5. 14. someone intercepts packets intended for one computer and reads the data
  6. 17. overwrite your boot sector, making it appear as if there is no pointer to your operating systems. The viruses work their way into the master boot record that is essential to the ground-zero sector on your hard disk where applications are not supposed to be.
  7. 21. attack well-known holes in software that is running on servers
  8. 23. a major spike in traffic in the network as bots that have been recruited mount the attack
  9. 25. the process of changing a source IP address so that one computer appears to be a different computer
  10. 27. paths leading into a computer or network
  11. 30. hacker captures raw packets of information off the network for analyzing
  12. 32. someone exploits a trust relationship in your network and the attacker gains control of a host that is outside the firewall and yet trusted by the host that are inside the firewall.
  13. 33. friendly fire, caused by a spike in activity to a website or a resource that overpowers its ability to respond
  14. 36. replaces some or all of the target program’s code with their own (i.e. executable application and system program files like those with filename ending in .com and .dll)
  15. 37. a service attack amplified by recruiting helpers in the attack process
  16. 39. using a rootkit to probe, scan, then capture data on strategically positioned computers poised to give hackers “eyes” in the entire system automatically.
  17. 40. (malware) any software that harms a computer, deletes data, or takes actions the user did not authorize.
  18. 41. attacker sends a large number of management packets called deauthentication frames on the WLAN, causing stations to be disconnected from the access point
  19. 43. the attacker attempts to refresh or update the record when it expires with a different address than the correct address
  20. 44. traffic from one VLAN being sent to the wrong VLAN
  21. 45. malicious employee (adhere to the principal of least privilege).
  22. 46. gathering all the information you can about a network in order to break into the network
Down
  1. 1. recruiting bots to aid the attack reflected of the Network Time Protocol servers.
  2. 2. an attacker takes over a user’s session with a secure server after authentication
  3. 3. capturing and analyzing leaking emanation of things like radio or electrical signals, sounds, and vibrations.
  4. 4. little programs that cause a variety of very bad things to happen to your computer. Such as, display a message, delete files, or send huge amounts of meaningless data over a network to block legitimate messages.
  5. 5. a part of a man-in-the-middle attack. Two computers having a conversation can insert an incorrect IP address
  6. 8. tunneling by concealing one protocol within another
  7. 9. password cracking, the attacker attempts every possible combination of numbers and letters that could be in a password
  8. 10. cloaks the identity of the device before performing the port scan (machine acts as a middleman for the request
  9. 11. Bomb malware that executes when forensics are being undertaken or when a particular event takes place
  10. 15. prevents users from accessing the network and/or its resources
  11. 16. first day the virus has been released and therefore no known fix exists.
  12. 18. the hacker breaks into the host machine and uses it to redirect traffic that normally would not be allowed passage through a firewall
  13. 19. malware prevents or limits users from accessing their information. The data is encrypted and the decryption key is only made available to the user when the ransom has been paid
  14. 20. the hacker writes the SSID and security employed near your facility online.
  15. 22. authentication, authorization, and accounting servers that verify the identity of, grant access to, and track the actions of users
  16. 24. a DoS that floods its victim with spoofed broadcast ping messages
  17. 26. attempting to illegally obtain sensitive information by pretending to be a credible source
  18. 28. reflection attack in that the attacker delivers traffic to the victim by reflecting it off a third party (sends a small DNS message using the victim’s IP address).
  19. 29. a group of programs connected on the Internet for the purpose of performing a task in a coordinating manner.
  20. 31. a humongous ICMP packet is sent to the remote host victim, totally flooding the victim’s buffer and causing the system to reboot or helplessly hang there drowning.
  21. 34. placing a fake VLAN tag into the packet along with the real tag
  22. 35. increase the effectiveness of a DoS attack
  23. 38. attacks that cause hardware damage to a device
  24. 42. a script of commonly enacted commands used to automatically carry out tasks without requiring a user to initiate them.