Cryptober Puzzle #1

12345678910111213141516
Across
  1. 9. The means of proving identity using two authentication factors
  2. 10. Any weakness in an asset or security protection which would allow for a threat to cause harm
  3. 12. The act of falsifying the identity of the source of a communication or interaction
  4. 14. A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
  5. 15. Program designed to detect and remove computer viruses
  6. 16. A social engineering attack that attempts to collect information from victims
Down
  1. 1. The process of proving an individual is a claimed identity
  2. 2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
  3. 3. The number one spot in the OWASP 10
  4. 4. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
  5. 5. A security tool that attempts to detect the presence of intruders or the occurrence of security violations
  6. 6. A place where websites can store local data on a client machine
  7. 7. The act of collecting frames or packets off of a data network communication
  8. 8. An update or change on an operating system or application
  9. 11. An error or mistake in software coding or hardware design or construction
  10. 13. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard