Cybersecurity Fundamental Chapter 3 Part 3
Across
- 3. occurs when data goes beyond the limits.
- 4. access point install on a secure network without explicit authorization.
- 6. pieces of software install by users to provide extended capabilities
- 7. security protocol that attempted to provide a wireless local area network with the same level of security as a wired lan.
- 9. attacker copies the victim's information from his/her devices
- 10. attacker send authorized messages to another bluetooth device
- 12. one way to store data at the website is to use a database.
Down
- 1. vulnerability found in web applications.
- 2. allow cybercriminals to execute malicious code and take control of a system with privileges of the user running the application remotely.
- 5. wireless signals are susceptible to electromagnetic interfaces
- 8. operate through an interpreter, the JVM.
- 11. susceptible to attack and an attacker cannot recover the key by observing the traffic.