Across
- 3. are the opposite of exploits.
- 6. Network Service Directory
- 8. Network Sniffing
- 9. OS Credential Dumping
- 10. Tangible IT system that actors attack and defend
Down
- 1. the application of typical elements of game playing to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
- 2. Brute-force password cracking
- 4. Command-line networking utility that reads and writes data across network.
- 5. a nonprofit foundation dedicated to improving software security through free and open-source tools.
- 7. Log Enumeration
