Cybersecurity Unit 8

123456789101112131415161718192021
Across
  1. 3. multiple systems under the control of the attacker are used in a coordinated attack
  2. 5. this type of hacker does not have permission and hacking in a criminal manner
  3. 7. opens a secure connection with another computer
  4. 8. An attack that prevents a system or server from functioning normally
  5. 10. opens a port to listen to incoming connections
  6. 12. this type of access point is installed on a secure network without explicit authorization
  7. 13. displays the IP address for the device
  8. 14. sends packets to another device to test connectivity
  9. 15. testing the effectiveness of security controls or find vulnerabilities in software
  10. 17. this type of attack is where the victim connects to a rogue access point instead of the legitimate one
  11. 19. does defensive pentesting
  12. 20. this hacker often has good intentions, but they don't have permission to hack
  13. 21. a tool that disguises your actual IP address and encrypts internet traffic between a device and a server
Down
  1. 1. this type of hacker has good intentions and received permission to hack
  2. 2. pulling email, contacts, passwords and other data off the device
  3. 4. an attack where the attacker poses as another by falsifying data to gain access to target systems
  4. 6. a technology that allows computers to remember IP addresses with their corresponding domain names
  5. 9. eavesdropping on messages
  6. 11. tool to monitor incoming and outgoing network connections
  7. 16. does offensive pentesting
  8. 18. spying on your device by gaining access and then installing a backdoor for future access
  9. 19. pushing unsolicited messages onto a device using Bluetooth