Across
- 3. Large scale attacks using remotely controlled malware-infected devices
- 5. Systems, functions & data being provided on-demand, based on levels of service and defined parameters
- 7. Number of stages of Penetration Testing
- 9. Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
- 10. Only authorized parties permitted to access sensitive information / functions
Down
- 1. Process of psychologically manipulating people to divulge personal or critical information
- 2. A method of interrupting data traffic between nodes and stealing the required information
- 4. Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
- 6. Ensuring only authorized users can enter, modify or delete information / functions
- 8. An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution