Road Security Crosswords

1234567891011121314151617
Across
  1. 1. Technique or code that takes advantage of a vulnerability.
  2. 3. Who uses skills to exploit systems or networks.
  3. 5. Is a technique used to assess the security of web applications by simulating attacks in real-time.
  4. 7. A potential harm or negative consequences that arise from vulnerabilities and threats.
  5. 9. Weakness or flaw that can be exploited.
  6. 10. The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
  7. 12. Malicious software that aims to damage or compromise systems.
  8. 14. A disruptive event that compromises the security or integrity.
  9. 16. A structured approach to developing software with a focus on security.
  10. 17. A type of security testing that analyzes application source code for vulnerabilities.
Down
  1. 2. A non-profit organization dedicated to improving software security through open resources and information.
  2. 4. The process of evaluating and analyzing potential risks and vulnerabilities.
  3. 6. Condition or circumstance that can cause harm or damage.
  4. 8. Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
  5. 11. Confidential or hidden information that is not widely known or shared
  6. 13. A security assessment that identifies vulnerabilities in computer systems and networks.
  7. 15. The process of reducing or minimizing the impact or severity.