Across
- 5. A sign an attack is currently underway
- 6. Software installed on a device without the user requesting it
- 8. Closing unused ports and disabling unnecessary protocols
- 10. An attack that copies data and then uses it
- 11. A cookie that is only sent to the server with an encrypted request
- 14. It only goes off after certain conditions are met
- 16. An indicator of attack in which data is no longer accessible
- 17. resource that is not possible due to geography
Down
- 1. inserts statements to manipulate a database server
- 2. threat actor gains illicit access of elevated rights or privileges
- 3. takes advantage of a vulnerability to move to restricted directories
- 4. Installing software security updates
- 7. An attack in which threat actors introduce something into RAM
- 9. An attack in which a website accepts user input without validating it
- 12. captures and stores each keystroke that a user types on the computer’s keyboard
- 13. A request that has been fabricated
- 15. A malicious program that uses a computer network to replicate