Across
- 2. Weakness in a system or network
- 4. A tool used to capture and analyze network traffic
- 5. Internet of Things
- 6. Virtual Private Network
- 8. An attack that floods a network with traffic to make it unavailable
- 9. A process of monitoring and capturing the data packets passing through a given network
- 10. A standalone program that can spread to other system
- 12. A unique serial number assigned to every network interface on every device
- 15. A hidden entry point into a system or network used to by-pass normal authentication procedure
- 17. Take advantage of the weak system or network
- 18. A server that acts as an intermediary between client and server
- 19. A type of malware developed by hackers to gain access to target systems
- 20. Internet Protocol
Down
- 1. A type of malware that can replicate itself
- 3. A device used to prevent unauthorized access
- 4. An attack that steals sensitive information by tricking users into providing it
- 7. A tool used to guess passwords through trial and error
- 11. A technique used to hide the contents of a message
- 13. A fraudulent practice in which communication is sent from an unauthorized source and disguised as a known source to the receiver
- 14. A device used to lure attackers into a trap
- 16. A technique used for collecting as much information as possible about the targeted network to execute a successful cyber attack
