Hack the Grid
Across
- 3. When an attacker gains control of a user’s account without permission
- 4. Indirect attack path through trusted vendors, software, or services
- 6. An attacker’s ability to maintain access to a system over time
- 7. Systematic discovery of users, services, or resources during an attack
- 8. Security risk caused by incorrect or unsafe system settings
Down
- 1. Technique used to move from one compromised system to others inside a network
- 2. Unauthorized transfer of data out of a system or network
- 5. Process of strengthening systems by reducing vulnerabilities and attack surfaces