Application Attacks
Across
- 6. Overloading a system’s resources to cause performance degradation or crashes.
- 7. The framework commonly used for penetration testing and executing exploits.
- 9. A cyberattack that targets a vendor or third-party provider to introduce vulnerabilities.
- 11. Junk email that is often used to spread malware, scams, or advertisements.
- 12. A malicious attempt to access restricted files by altering a website’s URL path.
- 14. A cyberattack where an application processes malformed XML data to manipulate database queries.
- 18. The practice of keeping software up-to-date to protect against vulnerabilities.
- 20. A social engineering attack that tricks users into providing sensitive information via emails or messages.
- 22. The unauthorized redirection of users from a legitimate site to a malicious one.
- 23. A cybersecurity practice that involves scanning attachments before opening them.
Down
- 1. An attack that abuses an application programming interface to steal or manipulate data.
- 2. A web attack where malicious scripts are injected into webpages and executed in a victim's browser.
- 3. A defense mechanism that automatically removes dangerous spam from inboxes.
- 4. A cyberattack that involves resending captured data packets to trick systems into repeated execution.
- 5. The best practice that involves writing secure and well-tested software to prevent attacks.
- 8. The technique of overwhelming a server by flooding it with excessive requests, making it unavailable.
- 9. A targeted phishing attack that customizes fraudulent messages based on personal details.
- 10. A cyberattack that redirects users to a fake website to steal their credentials.
- 13. A phishing attack targeting high-profile individuals such as executives and politicians.
- 15. A phishing attack conducted via voice communication to steal sensitive information.
- 16. The term for data storage areas that can be exploited if improperly managed, leading to attacks.
- 17. A security flaw where excess data overflows into adjacent memory space, leading to crashes or exploits.
- 19. The process of validating and sanitizing user input to prevent code injection attacks.
- 21. A tool often used for scanning networks and detecting vulnerabilities.