Chapter 5 Crossword Puzzle

1234567891011121314151617
Across
  1. 5. A sign an attack is currently underway
  2. 6. Software installed on a device without the user requesting it
  3. 8. Closing unused ports and disabling unnecessary protocols
  4. 10. An attack that copies data and then uses it
  5. 11. A cookie that is only sent to the server with an encrypted request
  6. 14. It only goes off after certain conditions are met
  7. 16. An indicator of attack in which data is no longer accessible
  8. 17. resource that is not possible due to geography
Down
  1. 1. inserts statements to manipulate a database server
  2. 2. threat actor gains illicit access of elevated rights or privileges
  3. 3. takes advantage of a vulnerability to move to restricted directories
  4. 4. Installing software security updates
  5. 7. An attack in which threat actors introduce something into RAM
  6. 9. An attack in which a website accepts user input without validating it
  7. 12. captures and stores each keystroke that a user types on the computer’s keyboard
  8. 13. A request that has been fabricated
  9. 15. A malicious program that uses a computer network to replicate