crossword

1234567891011121314
Across
  1. 2. Exploit that targets stack buffer overflow or OS in memory.
  2. 4. A comprehensive assessment and analysis of an organization’s cybersecurity and cyber risks.
  3. 6. An APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
  4. 7. Attack that redirects users to malicious sites by corrupting DNS cache entries with forged responses.
  5. 9. A security standard that outlines the minimum required security controls for an organization's systems.
  6. 11. Attack where malicious software secretly records everything typed on the keyboard.
  7. 12. Technology that stores data and applications online instead of local servers.
  8. 14. Tool widely used for finding and exploiting web application vulnerabilities.
Down
  1. 1. A requirement that prevents use of default passwords or weak authentication methods.
  2. 3. Malware that hides in system memory without leaving traces on disk.
  3. 5. Security technique that isolates code execution in a controlled environment to prevent it from affecting the broader system.
  4. 6. A unique identifier generated by the server to maintain a user's session, typically used by web applications.
  5. 8. Tool aggregates and analyzes log and event data to detect threats and support incident response.
  6. 10. Practice that enforces permissions based on job roles.
  7. 13. A malware designed to give hackers access to and control over a target device.