Cyber Security

12345678910
Across
  1. 3. Observe each activity on the internet of the victim, gather all information in the background, and send it to someone else is called _________.
  2. 4. Name any one cyber attack
  3. 9. When Internet server is flooded with continuous bogus requests so as to deny legitimate users to use the server or to crash the server is called ____.
  4. 10. an act of gaining unauthorized access to a computer system or network is called ____.
Down
  1. 1. A self-replicating program that runs and spreads by modifying other programs or files is ____ A program that is installed on a system to cause it to attack other systems is called _______Zombie
  2. 2. is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
  3. 5. Name any one password cracking tool.
  4. 6. ________ is the attack which extracts confidential information from the bank/financial institutional account holders by illegal ways.
  5. 7. A program that is installed on a system to cause it to attack other systems is called _______
  6. 8. This spyware installs itself onto a device while a user is installing specific PC games, then tracks their online activity is ____