Cisco Security

123456789101112131415
Across
  1. 3. First half of a login
  2. 5. Malicious intent hacker (2 words)
  3. 6. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
  4. 8. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
  5. 10. Attack which denys a machine or resource to intended users. (ABBR)
  6. 11. Monitored isolated data designed to study attack methods
  7. 13. "Security has to happen at the _________" - John Chambers
  8. 14. Known for fuzzing tools for software crash testing
Down
  1. 1. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
  2. 2. Development process Cisco uses to increase resiliency and trustworthiness.
  3. 4. Psychological manipulation of people to perform actions or divulge security info (2 words)
  4. 7. Hacker with protective intent (2 words)
  5. 9. Type of security including locked doors, badge readers and surveillance cams
  6. 12. _____-_____ Cracking method trying every possible combination
  7. 15. Attack which overwrites buffers boundary and adjacent memory