Across
- 9. The means of proving identity using two authentication factors
- 10. Any weakness in an asset or security protection which would allow for a threat to cause harm
- 12. The act of falsifying the identity of the source of a communication or interaction
- 14. A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
- 15. Program designed to detect and remove computer viruses
- 16. A social engineering attack that attempts to collect information from victims
Down
- 1. The process of proving an individual is a claimed identity
- 2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
- 3. The number one spot in the OWASP 10
- 4. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
- 5. A security tool that attempts to detect the presence of intruders or the occurrence of security violations
- 6. A place where websites can store local data on a client machine
- 7. The act of collecting frames or packets off of a data network communication
- 8. An update or change on an operating system or application
- 11. An error or mistake in software coding or hardware design or construction
- 13. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
