Across
- 2. an attacks uses a botnet to overwhelm a server or other network resource with fraudulent traffic, thus triggering the system to deny access to legitimate users.
- 4. Phishing, spear phishing, vishing, scareware and watering hole attacks are all types of-
- 5. Voice ID, fingerprint scan and iris recognition are each examples of:
Down
- 1. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
- 3. A self-replicating malware that spreads by duplicating itself in order to infect other devices without user interaction.
