Hack the Grid

12345678
Across
  1. 3. When an attacker gains control of a user’s account without permission
  2. 4. Indirect attack path through trusted vendors, software, or services
  3. 6. An attacker’s ability to maintain access to a system over time
  4. 7. Systematic discovery of users, services, or resources during an attack
  5. 8. Security risk caused by incorrect or unsafe system settings
Down
  1. 1. Technique used to move from one compromised system to others inside a network
  2. 2. Unauthorized transfer of data out of a system or network
  3. 5. Process of strengthening systems by reducing vulnerabilities and attack surfaces