Network Security

123456789
Across
  1. 1. A type of penetration testing that mimics an external attack on the system. (5,3)
  2. 4. This type of malware appears to be legitimate, like a game, but is actually harmful.
  3. 5. A type of malware that locks a device and demands a fee to unlock it.
  4. 6. A type of attack where someone monitors data traveling on a network to intercept sensitive information.
  5. 7. A technique where cybercriminals send messages disguised as from a trusted source to steal personal data.
  6. 9. A method to prevent unauthorized access to data by translating it into code that only someone with the correct key can access.
Down
  1. 1. An attack that uses automated software to produce hundreds of likely passwords to gain access to accounts. (5,5)
  2. 2. A type of malware that self-replicates and attaches to another file or program.
  3. 3. A type of attack where a server is flooded with useless traffic, causing it to slow down or become unusable.(6,2,7)
  4. 8. A type of social engineering attack where the attacker watches the victim over their shoulder to gain personal information.