Application Security SET -B

12345678910
Across
  1. 3. are the opposite of exploits.
  2. 6. Network Service Directory
  3. 8. Network Sniffing
  4. 9. OS Credential Dumping
  5. 10. Tangible IT system that actors attack and defend
Down
  1. 1. the application of typical elements of game playing to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
  2. 2. Brute-force password cracking
  3. 4. Command-line networking utility that reads and writes data across network.
  4. 5. a nonprofit foundation dedicated to improving software security through free and open-source tools.
  5. 7. Log Enumeration