IS ASSIGNMENT 1

12345
Across
  1. 2. an attacks uses a botnet to overwhelm a server or other network resource with fraudulent traffic, thus triggering the system to deny access to legitimate users.
  2. 4. Phishing, spear phishing, vishing, scareware and watering hole attacks are all types of-
  3. 5. Voice ID, fingerprint scan and iris recognition are each examples of:
Down
  1. 1. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
  2. 3. A self-replicating malware that spreads by duplicating itself in order to infect other devices without user interaction.