Security Crossword Puzzle - October 2021
Across
- 6. This is a software vulnerability usually found in Web applications that allows online criminals to inject client-side script into pages that other users view
- 8. This is a program used for security purposes which is able to simulate one or more network services to look like a vulnerability and act as a bait to the attacker
- 9. You should not just check identity; you should also confirm
- 10. Hackers take advantage from this type of attack that can lead to unauthorized code running or system crashes
Down
- 1. In cyber security, intrusion refers to the act of getting around a system’s security mechanisms to gain unauthorized access.
- 2. The process of stealing someone’s personal identification data and using it online in order to pose as that person
- 3. The main goal of this process is to identify, analyze and present facts about a digital investigation. The conclusions of this can be used in fight against cyber-crime or for civil proceedings
- 4. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- 5. In cryptography, this attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing it correctly
- 7. This can slow down your computer and watch everywhere you go on the internet