Across
- 2. A reflection-based DDoS attack that uses spoofed DNS queries to flood a target.
- 5. Exploiting the grace period in domain registration to avoid paying for it.
- 6. A DDoS attack using spoofed ping requests to flood a target via a broadcast address.
- 7. Taking over an established TCP session without the user’s knowledge.
- 8. A hardware-based DoS attack that renders the device unusable.
- 11. An attack that overwhelms a system with continuous ICMP echo requests.
- 15. A random number used once to prevent replay attacks.
- 16. An anonymous connection to a system using no credentials.
- 17. Capturing and reusing data transmissions to gain unauthorized access.
- 18. A security feature that detects and prevents flooding attacks.
Down
- 1. Targeting a site visited by victims to infect them with malware.
- 3. An attack that sends fake ARP messages to redirect network traffic.
- 4. A social engineering attack that tricks users into revealing sensitive information.
- 6. A DoS attack that exploits the TCP handshake by sending repeated SYN requests.
- 8. A DoS attack that sends malformed or oversized ping packets to crash a system.
- 9. Faking data such as IP or MAC addresses to disguise an attack.
- 10. A malware attack where the browser is controlled to alter transactions or data.
- 12. A variant of the Smurf attack that uses UDP instead of ICMP.
- 13. A DoS attack that sends fragmented packets that systems can't reassemble.
- 14. A type of DoS attack that replicates processes endlessly to exhaust system resources.
