Across
- 4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 5. An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element, which may allow attackers to steal credentials or reveal other confidential information.
- 6. Second component of the famous InfoSec triad.
- 7. A function that can be used to map data of arbitrary size to fixed-size values.
- 10. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- 12. An attack that aims to access files and directories that are stored outside the web root folder.
- 13. Third component of the famous InfoSec triad.
Down
- 1. An attack where the attacker secretly relays and possibly alters the communications between two parties.
- 2. The original name of AES, a specification used for the encryption of electronic data.
- 3. A method of trying to gather personal information using deceptive e-mails and websites.
- 5. First component of the famous InfoSec triad.
- 8. An attack where the attacker submits many passwords / passphrases with the hope of eventually guessing it correctly.
- 9. A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
- 11. _________ occurs when a program tries to store more data in a temporary storage area than it can hold.