Cyber Security Unit-3 Puzzle

1234567891011121314
Across
  1. 2. Database query language often exploited for injection attacks.
  2. 5. Method of guessing passwords by trying all possibilities.
  3. 6. Condition where timing flaws lead to security gaps.
  4. 7. Technique of inserting malicious code into input fields.
  5. 9. Memory structure targeted in buffer overflow attacks.
  6. 10. Small piece of code used to exploit a vulnerability.
  7. 13. Process of gathering information before an attack.
  8. 14. Code or tool designed to abuse vulnerabilities.
Down
  1. 1. Technique aimed at disturbing or halting services.
  2. 3. Attack using precompiled lists of common passwords.
  3. 4. Searching for insecure wireless networks to exploit.
  4. 8. Error caused when data exceeds memory storage limits.
  5. 10. Engineering attack that manipulates human behavior.
  6. 11. Attack that makes a system unavailable to users.
  7. 12. Cross-site scripting that injects scripts into web pages.