Across
- 3. Observe each activity on the internet of the victim, gather all information in the background, and send it to someone else is called _________.
- 4. Name any one cyber attack
- 9. When Internet server is flooded with continuous bogus requests so as to deny legitimate users to use the server or to crash the server is called ____.
- 10. an act of gaining unauthorized access to a computer system or network is called ____.
Down
- 1. A self-replicating program that runs and spreads by modifying other programs or files is ____ A program that is installed on a system to cause it to attack other systems is called _______Zombie
- 2. is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
- 5. Name any one password cracking tool.
- 6. ________ is the attack which extracts confidential information from the bank/financial institutional account holders by illegal ways.
- 7. A program that is installed on a system to cause it to attack other systems is called _______
- 8. This spyware installs itself onto a device while a user is installing specific PC games, then tracks their online activity is ____
