Chapter 5 Security Plus

1234567891011121314151617181920212223242526
Across
  1. 2. It only goes off after certain conditions are met
  2. 7. inserts statements to manipulate a database server
  3. 11. An attack that copies data and then uses it
  4. 14. resource that is not possible due to geography
  5. 15. account that is inaccessible through a normal login attempt
  6. 17. A malicious program that uses a computer network to replicate
  7. 21. A cookie that is only sent to the server with an encrypted request
  8. 22. takes advantage of a vulnerability to move to restricted directories
  9. 24. Software installed on a device without the user requesting it
  10. 25. A request that has been fabricated
  11. 26. Malware disguised as something useful or legitimate
Down
  1. 1. An indicator of attack in which data is no longer accessible
  2. 3. store data in RAM beyond the boundaries
  3. 4. threat actor gains illicit access of elevated rights or privileges
  4. 5. An attack in which threat actors introduce something into RAM
  5. 6. An attack in which a website accepts user input without validating it
  6. 8. Closing unused ports and disabling unnecessary protocols
  7. 9. move from the root directory to other restricted directories
  8. 10. hides its presence on the device
  9. 11. depletion of memory or processing capabilities
  10. 12. Installing software security updates
  11. 13. Attack that copies data and then uses it
  12. 16. Secure space for running untrusted software
  13. 18. Malware that replicates by infecting other files or programs
  14. 19. captures and stores each keystroke that a user types on the computer’s keyboard
  15. 20. monitors endpoints and immediately blocks a malicious attack
  16. 23. A sign an attack is currently underway