Chapter 2 - Methods of Security Attacks

1234567891011121314151617181920
Across
  1. 4. The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
  2. 5. The act of listening in on a conversation or monitoring network traffic.
  3. 11. A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
  4. 12. The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
  5. 13. A type of attack where the attacker is physically close to the target system.
  6. 14. A form of social engineering attack over Voice over IP (VoIP).
  7. 16. Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
  8. 17. A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
  9. 18. A type of attack that relies on persuading a person to reveal information.
  10. 19. Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
  11. 20. A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
  1. 1. A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
  2. 2. A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
  3. 3. A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
  4. 6. A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
  5. 7. Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
  6. 8. The process of an attacker gathering information about a network for a future attack.
  7. 9. A specific type of spear phishing aimed at high-level executives or important individuals.
  8. 10. Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
  9. 15. An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.