Unit 32 How networks can be attacked

12345678910
Across
  1. 3. Also known for advertising supported software
  2. 5. Know as malicious software
  3. 7. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
  4. 9. force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
  5. 10. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
Down
  1. 1. of service It attempts to make a user or organisation lose its services
  2. 2. Usually these are statistical analyses that attempt to discover keys
  3. 4. door Is a method where any virus such Trojan, Malware can get through all security procedures
  4. 6. Is a type of malicious software that is activated each time your system boots up
  5. 7. Is a software that gathers information about a person or organisation without their knowledge
  6. 8. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated