Cybersecurity Vocabulary

12345678910111213141516
Across
  1. 3. A bug where user input is passed as the format argument to printf
  2. 5. This is when an application reveals sensitive data
  3. 7. determines strength and validity of passwords.
  4. 8. A secret entry point into a program.
  5. 11. can undermine the controls that secure the data of millions
  6. 14. The result of a mismatch between arithmetic and mathematical arithmetic
  7. 15. The web server account is incorrectly given access to the system files
  8. 16. Is the manipulation of people to divulge information or performing actions.
Down
  1. 1. Somebody who gains illegal access to a phones system.
  2. 2. An attempt to crack a password by using every combination of letters and digits until a password is cracked.
  3. 4. bypassing standard authentication or encryption in a computer.
  4. 6. Mother Nature's actions
  5. 9. A trapdoor in software that allows easy maintenance
  6. 10. A subset of the Trojan horse malware.
  7. 12. A system used to gain authentications by cracking a password hash.
  8. 13. when a hacker exploits the vulnerability before its fixed.