Cybersecurity & Web Exploitation Crossword
Across
- 5. CSRF attacks use the ___ of other users without their knowledge.
- 7. "Access control" is ensuring users cannot act outside of intended ___.
- 8. You access web applications with this.
- 11. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
- 12. When a malicious actor hijacks clicks meant for a visible top-level site.
- 14. For security reasons, by default, web apps should not ___ data from the browser.
- 15. The OSI model has ___ layers.
Down
- 1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
- 2. In cybersecurity, blue teams do this.
- 3. Acronym for the organization set up to improve software security in 2001.
- 4. SQL injection attacks can give ___ to data users typically can't retrieve.
- 6. What does the "I" in OSI stand for?
- 9. In cybersecurity, red teams do this.
- 10. ___ hat hackers hack unethically, for personal gain.
- 13. ___ sanitization is the modification of user data so that it can't run scripts.