Cybersecurity Fundamental Chapter 3 Part 3

123456789101112
Across
  1. 3. occurs when data goes beyond the limits.
  2. 4. access point install on a secure network without explicit authorization.
  3. 6. pieces of software install by users to provide extended capabilities
  4. 7. security protocol that attempted to provide a wireless local area network with the same level of security as a wired lan.
  5. 9. attacker copies the victim's information from his/her devices
  6. 10. attacker send authorized messages to another bluetooth device
  7. 12. one way to store data at the website is to use a database.
Down
  1. 1. vulnerability found in web applications.
  2. 2. allow cybercriminals to execute malicious code and take control of a system with privileges of the user running the application remotely.
  3. 5. wireless signals are susceptible to electromagnetic interfaces
  4. 8. operate through an interpreter, the JVM.
  5. 11. susceptible to attack and an attacker cannot recover the key by observing the traffic.