1/12 15
2
3 16
4
14 5
13 17
6
7
8
9
10
11

Crossword: Network Security Threats

Across

1. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.

2. An attack where an attacker physically taps into a network cable to intercept data passing through.

3. A type of malicious software that can replicate itself and spread to other computers.

4. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.

5. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.

6. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.

7. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.

8. The act of manipulating people into performing actions or divulging confidential information.

9. A fraudulent site created to mimic a legitimate platform.

10. A popular asymmetric encryption algorithm used for secure communication and data protection.

11. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.

Down

12. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.

13. A type of symmetric encryption algorithm that encrypts data one bit at a time.

14. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.

15. A cryptographic system that uses a pair of keys for encryption: a public key for encrypting data and a private key for decrypting data.

16. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.

17. The process of filtering and validating user input before using it in an application.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓