Cybersecurity Fundamental Chapter 3 Part 2

123456789101112131415
Across
  1. 1. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
  2. 6. one man's trash is another man's treasure
  3. 11. use short message service (sms) to send fake text messages
  4. 12. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
  5. 13. application that behave in an annoying or undesirable manner.
  6. 14. impersonation attack, and it takes advantage of a trusted relationship between two systems.
  7. 15. criminal tags along with an authorized person to gain entry into a secured location.
Down
  1. 2. looking over one's shoulder to get their pin or access code.
  2. 3. an attacker requests personal information from a party in exchange for something like a gift.
  3. 4. intercepting communication between computers to steal information crossing the network.
  4. 5. action of pretending to be someone else
  5. 7. non-technical means for a criminal to gather information on a target.
  6. 8. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
  7. 9. examines all network traffic as it passes through their Network Interface Card (NIC).
  8. 10. records or logs the keystrokes of the user of the system.