Network Based Attacks

123456789101112
Across
  1. 2. intercepting two way communications between 2 parties
  2. 3. exploiting weaknesses in ARP
  3. 7. translates domain names into ip addresses
  4. 11. capturing information from communications you shouldn't
  5. 12. tools used to scan for vulnerabilities and open ports
Down
  1. 1. cyber attack that first scans for vulnerabilities in a system
  2. 4. exploits a vulnerability before vendor is aware of it
  3. 5. identifies hosts in a network
  4. 6. attack by stealing a session key or cookie
  5. 8. posing as something you're not
  6. 9. group of infected computers that work together without the owners knowledge
  7. 10. denial of service attack