Application Attacks

1234567891011121314151617181920212223
Across
  1. 6. Overloading a system’s resources to cause performance degradation or crashes.
  2. 7. The framework commonly used for penetration testing and executing exploits.
  3. 9. A cyberattack that targets a vendor or third-party provider to introduce vulnerabilities.
  4. 11. Junk email that is often used to spread malware, scams, or advertisements.
  5. 12. A malicious attempt to access restricted files by altering a website’s URL path.
  6. 14. A cyberattack where an application processes malformed XML data to manipulate database queries.
  7. 18. The practice of keeping software up-to-date to protect against vulnerabilities.
  8. 20. A social engineering attack that tricks users into providing sensitive information via emails or messages.
  9. 22. The unauthorized redirection of users from a legitimate site to a malicious one.
  10. 23. A cybersecurity practice that involves scanning attachments before opening them.
Down
  1. 1. An attack that abuses an application programming interface to steal or manipulate data.
  2. 2. A web attack where malicious scripts are injected into webpages and executed in a victim's browser.
  3. 3. A defense mechanism that automatically removes dangerous spam from inboxes.
  4. 4. A cyberattack that involves resending captured data packets to trick systems into repeated execution.
  5. 5. The best practice that involves writing secure and well-tested software to prevent attacks.
  6. 8. The technique of overwhelming a server by flooding it with excessive requests, making it unavailable.
  7. 9. A targeted phishing attack that customizes fraudulent messages based on personal details.
  8. 10. A cyberattack that redirects users to a fake website to steal their credentials.
  9. 13. A phishing attack targeting high-profile individuals such as executives and politicians.
  10. 15. A phishing attack conducted via voice communication to steal sensitive information.
  11. 16. The term for data storage areas that can be exploited if improperly managed, leading to attacks.
  12. 17. A security flaw where excess data overflows into adjacent memory space, leading to crashes or exploits.
  13. 19. The process of validating and sanitizing user input to prevent code injection attacks.
  14. 21. A tool often used for scanning networks and detecting vulnerabilities.