Across
- 2. hack into telecommunications systems, especially to obtain free calls.
- 5. a type of network attack used to gain unauthorized access to systems within a security perimeter
- 6. a person who uses computers to gain unauthorized access to data
- 8. If users are unable to achieve the defined goal.
- 10. are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
- 11. the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
- 13. Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
- 14. someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
- 15. Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
- 1. Used by hijacking to gain access to a targets computer or online accounts
- 3. The act of entering false information into a DNS cache
- 4. a systematic approach to managing all changes made to a product or system
- 7. Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
- 9. a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
- 12. A technique whereby packet data flowing across the network is detected and observed