Cybersecurity Definitions

123456789101112131415
Across
  1. 2. hack into telecommunications systems, especially to obtain free calls.
  2. 5. a type of network attack used to gain unauthorized access to systems within a security perimeter
  3. 6. a person who uses computers to gain unauthorized access to data
  4. 8. If users are unable to achieve the defined goal.
  5. 10. are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
  6. 11. the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
  7. 13. Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
  8. 14. someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  9. 15. Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
  1. 1. Used by hijacking to gain access to a targets computer or online accounts
  2. 3. The act of entering false information into a DNS cache
  3. 4. a systematic approach to managing all changes made to a product or system
  4. 7. Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
  5. 9. a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
  6. 12. A technique whereby packet data flowing across the network is detected and observed