Cybersecurity Fundamental Chapter 3 Part 2

12345678910111213141516
Across
  1. 3. looking over one's shoulder to get their pin or access code.
  2. 5. records or logs the keystrokes of the user of the system.
  3. 6. action of pretending to be someone else
  4. 7. intercepting communication between computers to steal information crossing the network.
  5. 9. examines all network traffic as it passes through their Network Interface Card (NIC).
  6. 10. criminal tags along with an authorized person to gain entry into a secured location.
  7. 11. use short message service (sms) to send fake text messages
  8. 14. impersonation attack, and it takes advantage of a trusted relationship between two systems.
  9. 16. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Down
  1. 1. one man's trash is another man's treasure
  2. 2. non-technical means for a criminal to gather information on a target.
  3. 4. an attacker requests personal information from a party in exchange for something like a gift.
  4. 8. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
  5. 12. posing as a IRAS employee, told the victim that they own money to IRAS.
  6. 13. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
  7. 15. application that behave in an annoying or undesirable manner.