Network Attacks

12345678910
Across
  1. 2. A hidden access point in a system that bypasses normal authentication, often created by attackers or poorly secured software.
  2. 3. Attack A method that exploits weaknesses in encryption algorithms or security protocols using advanced mathematical techniques.
  3. 4. Software that automatically displays or downloads unwanted advertising, often bundled with free programs.
  4. 7. Self-replicating malware that spreads across networks without user intervention.
  5. 8. Malicious software disguised as legitimate programs to trick users into installing them.
  6. 9. An attack where an intruder disguises their identity by faking IP addresses, emails, or websites to trick users or systems.
  7. 10. Malicious tools that hide the presence of other malware and give attackers persistent administrative access to a system.
Down
  1. 1. An attack that takes advantage of bugs or vulnerabilities in software to gain unauthorized access or control.
  2. 5. A trial-and-error attack that systematically attempts all possible passwords or keys until the correct one is found.
  3. 6. Malicious programs that attach to files or applications and spread when the infected files are executed.
  4. 9. Software that secretly monitors and collects user activity or data without consent.