Across
- 2. It only goes off after certain conditions are met
- 7. inserts statements to manipulate a database server
- 11. An attack that copies data and then uses it
- 14. resource that is not possible due to geography
- 15. account that is inaccessible through a normal login attempt
- 17. A malicious program that uses a computer network to replicate
- 21. A cookie that is only sent to the server with an encrypted request
- 22. takes advantage of a vulnerability to move to restricted directories
- 24. Software installed on a device without the user requesting it
- 25. A request that has been fabricated
- 26. Malware disguised as something useful or legitimate
Down
- 1. An indicator of attack in which data is no longer accessible
- 3. store data in RAM beyond the boundaries
- 4. threat actor gains illicit access of elevated rights or privileges
- 5. An attack in which threat actors introduce something into RAM
- 6. An attack in which a website accepts user input without validating it
- 8. Closing unused ports and disabling unnecessary protocols
- 9. move from the root directory to other restricted directories
- 10. hides its presence on the device
- 11. depletion of memory or processing capabilities
- 12. Installing software security updates
- 13. Attack that copies data and then uses it
- 16. Secure space for running untrusted software
- 18. Malware that replicates by infecting other files or programs
- 19. captures and stores each keystroke that a user types on the computer’s keyboard
- 20. monitors endpoints and immediately blocks a malicious attack
- 23. A sign an attack is currently underway