Across
- 1. Known for fuzzing tools for software crash testing
- 4. _____-_____ Cracking method trying every possible combination
- 6. Attack which denys a machine or resource to intended users. (ABBR)
- 9. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- 10. Type of security including locked doors, badge readers and surveillance cams
- 13. Monitored isolated data designed to study attack methods
- 14. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- 15. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
- 2. Attack which overwrites buffers boundary and adjacent memory
- 3. "Security has to happen at the _________" - John Chambers
- 5. Malicious intent hacker (2 words)
- 7. Psychological manipulation of people to perform actions or divulge security info (2 words)
- 8. Development process Cisco uses to increase resiliency and trustworthiness.
- 11. First half of a login
- 12. Hacker with protective intent (2 words)
