Cyber Security Unit-3 Puzzle

123456789101112131415
Across
  1. 1. Attack using precompiled lists of common passwords.
  2. 3. Searching for insecure wireless networks to exploit.
  3. 6. Small piece of code used to exploit a vulnerability.
  4. 10. Technique aimed at disturbing or halting services.
  5. 13. Memory structure targeted in buffer overflow attacks.
  6. 14. Process of gathering information before an attack.
Down
  1. 2. Error caused when data exceeds memory storage limits.
  2. 4. Technique of inserting malicious code into input fields.
  3. 5. Cross-site scripting that injects scripts into web pages.
  4. 7. Code or tool designed to abuse vulnerabilities.
  5. 8. Method of guessing passwords by trying all possibilities.
  6. 9. Attack that makes a system unavailable to users.
  7. 11. Condition where timing flaws lead to security gaps.
  8. 12. Engineering attack that manipulates human behavior.
  9. 15. Database query language often exploited for injection attacks.