Cisco Security

123456789101112131415
Across
  1. 2. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
  2. 4. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL ______
  3. 7. Monitored isolated data designed to study attack methods
  4. 10. Psychological manipulation of people to perform actions or divulge security info (2 words)
  5. 12. "Security has to happen at the _________" - John Chambers
  6. 13. Malicious intent hacker
  7. 15. First half of a login
Down
  1. 1. Attack which overwrites buffers boundary and adjacent memory
  2. 3. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
  3. 5. Known for fuzzing tools for software crash testing
  4. 6. Type of security including locked doors, badge readers and surveillance cams
  5. 8. Hacker with protective intent
  6. 9. Development process Cisco uses to increase resiliency and trustworthiness.
  7. 11. _____-_____ Cracking method trying every possible combination
  8. 14. Attack which denys a machine or resource to intended users. (ABBR)