Cyber Security Unit-3 Puzzle

1234567891011121314
Across
  1. 3. Searching for insecure wireless networks to exploit.
  2. 4. Small piece of code used to exploit a vulnerability.
  3. 7. Memory structure targeted in buffer overflow attacks.
  4. 8. Technique aimed at disturbing or halting services.
  5. 10. Cross-site scripting that injects scripts into web pages.
  6. 12. Process of gathering information before an attack.
  7. 13. Method of guessing passwords by trying all possibilities.
  8. 14. Engineering attack that manipulates human behavior.
Down
  1. 1. Condition where timing flaws lead to security gaps.
  2. 2. Code or tool designed to abuse vulnerabilities.
  3. 5. Attack using precompiled lists of common passwords.
  4. 6. Error caused when data exceeds memory storage limits.
  5. 8. Attack that makes a system unavailable to users.
  6. 9. Technique of inserting malicious code into input fields.
  7. 11. Database query language often exploited for injection attacks.