Across
- 2. Database query language often exploited for injection attacks.
- 5. Method of guessing passwords by trying all possibilities.
- 6. Condition where timing flaws lead to security gaps.
- 7. Technique of inserting malicious code into input fields.
- 9. Memory structure targeted in buffer overflow attacks.
- 10. Small piece of code used to exploit a vulnerability.
- 13. Process of gathering information before an attack.
- 14. Code or tool designed to abuse vulnerabilities.
Down
- 1. Technique aimed at disturbing or halting services.
- 3. Attack using precompiled lists of common passwords.
- 4. Searching for insecure wireless networks to exploit.
- 8. Error caused when data exceeds memory storage limits.
- 10. Engineering attack that manipulates human behavior.
- 11. Attack that makes a system unavailable to users.
- 12. Cross-site scripting that injects scripts into web pages.
