Across
- 2. Exploit that targets stack buffer overflow or OS in memory.
- 4. A comprehensive assessment and analysis of an organization’s cybersecurity and cyber risks.
- 6. An APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
- 7. Attack that redirects users to malicious sites by corrupting DNS cache entries with forged responses.
- 9. A security standard that outlines the minimum required security controls for an organization's systems.
- 11. Attack where malicious software secretly records everything typed on the keyboard.
- 12. Technology that stores data and applications online instead of local servers.
- 14. Tool widely used for finding and exploiting web application vulnerabilities.
Down
- 1. A requirement that prevents use of default passwords or weak authentication methods.
- 3. Malware that hides in system memory without leaving traces on disk.
- 5. Security technique that isolates code execution in a controlled environment to prevent it from affecting the broader system.
- 6. A unique identifier generated by the server to maintain a user's session, typically used by web applications.
- 8. Tool aggregates and analyzes log and event data to detect threats and support incident response.
- 10. Practice that enforces permissions based on job roles.
- 13. A malware designed to give hackers access to and control over a target device.
