Cisco Security

123456789101112131415
Across
  1. 1. Known for fuzzing tools for software crash testing
  2. 4. _____-_____ Cracking method trying every possible combination
  3. 6. Attack which denys a machine or resource to intended users. (ABBR)
  4. 9. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
  5. 10. Type of security including locked doors, badge readers and surveillance cams
  6. 13. Monitored isolated data designed to study attack methods
  7. 14. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
  8. 15. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
  1. 2. Attack which overwrites buffers boundary and adjacent memory
  2. 3. "Security has to happen at the _________" - John Chambers
  3. 5. Malicious intent hacker (2 words)
  4. 7. Psychological manipulation of people to perform actions or divulge security info (2 words)
  5. 8. Development process Cisco uses to increase resiliency and trustworthiness.
  6. 11. First half of a login
  7. 12. Hacker with protective intent (2 words)