REV CyberSecurity Awareness Crossword Puzzle # 1

123456789101112131415
Across
  1. 5. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
  2. 8. type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. 10. approval, permission, or empowerment for someone or something to do something.
  4. 11. basic communication language or "protocol" of the Internet.
  5. 13. TCP/IP protocol specifying the transfer of text or binary files across the network.
  6. 15. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
  1. 1. encrypted form of the message being sent.
  2. 2. process of confirming the correctness of the claimed identity.
  3. 3. prove that a user sent a message and the message has not been altered.
  4. 4. software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  5. 6. sequence of eight bits.
  6. 7. pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  7. 9. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  8. 12. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  9. 14. cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.