Cisco Security
Across
- 2. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
- 4. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL ______
- 7. Monitored isolated data designed to study attack methods
- 10. Psychological manipulation of people to perform actions or divulge security info (2 words)
- 12. "Security has to happen at the _________" - John Chambers
- 13. Malicious intent hacker
- 15. First half of a login
Down
- 1. Attack which overwrites buffers boundary and adjacent memory
- 3. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- 5. Known for fuzzing tools for software crash testing
- 6. Type of security including locked doors, badge readers and surveillance cams
- 8. Hacker with protective intent
- 9. Development process Cisco uses to increase resiliency and trustworthiness.
- 11. _____-_____ Cracking method trying every possible combination
- 14. Attack which denys a machine or resource to intended users. (ABBR)