Across
- 4. A cryptographic attack on hash collisions
- 6. A sudden unplanned event.
- 7. Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
- 9. An attack that seeks to obtain personal or private financial information through domain spoofing
- 10. The action of multiple attackers planning a cyberattack
Down
- 1. The art of exploiting bugs and weaknesses that exist in the telephone system
- 2. A process of changing hardware and software configurations to make computers and devices as secure as possible.
- 3. The capture and monitoring of network IP packets using a packet sniffer
- 5. A type of fraud in which an attacker attempts to trick the victim into providing private information.
- 8. The act of unscrambling ciphertext into plaintext