Across
- 3. First half of a login
- 5. Malicious intent hacker (2 words)
- 6. Cisco team who manages receipt, investigation and reporting of security vulnerabilities
- 8. First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- 10. Attack which denys a machine or resource to intended users. (ABBR)
- 11. Monitored isolated data designed to study attack methods
- 13. "Security has to happen at the _________" - John Chambers
- 14. Known for fuzzing tools for software crash testing
Down
- 1. Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- 2. Development process Cisco uses to increase resiliency and trustworthiness.
- 4. Psychological manipulation of people to perform actions or divulge security info (2 words)
- 7. Hacker with protective intent (2 words)
- 9. Type of security including locked doors, badge readers and surveillance cams
- 12. _____-_____ Cracking method trying every possible combination
- 15. Attack which overwrites buffers boundary and adjacent memory
