Types of Hacking Attacks

12345678910
Across
  1. 3. Changing IP addresses in DNS servers so that users are directed to fake websites
  2. 4. In a..... attack, multiple compromised computer systems flood a target device like a webserver with bad connection requests, causing the device to slow or crash
  3. 7. A ..... attack is where attackers intercept communications between two devices for the purpose of stealing passwords, credit card numbers, etc.
  4. 8. This is when an attack is carried out by an employee or someone working inside an organization
  5. 9. A ....secretly monitors and logs a users keystrokes to capture passwords, PIN codes and other confidential information
  6. 10. Changing the URL used to access a website to see if access can be gained to confidential information
Down
  1. 1. This type of attack uses malicious database requests to steal user information from website databases
  2. 2. In a ........ attack, a legitimate but insecure website trusted by users is infected with malicious code so that visitors to the site are infected.
  3. 5. In a.... attack, the hacker uses a preselected library of commonly used words and phrases to try to crack passwords
  4. 6. a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals to perform cyberattacks