Cybersecurity is Awesome

12345678910111213
Across
  1. 4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. 5. An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element, which may allow attackers to steal credentials or reveal other confidential information.
  3. 6. Second component of the famous InfoSec triad.
  4. 7. A function that can be used to map data of arbitrary size to fixed-size values.
  5. 10. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  6. 12. An attack that aims to access files and directories that are stored outside the web root folder.
  7. 13. Third component of the famous InfoSec triad.
Down
  1. 1. An attack where the attacker secretly relays and possibly alters the communications between two parties.
  2. 2. The original name of AES, a specification used for the encryption of electronic data.
  3. 3. A method of trying to gather personal information using deceptive e-mails and websites.
  4. 5. First component of the famous InfoSec triad.
  5. 8. An attack where the attacker submits many passwords / passphrases with the hope of eventually guessing it correctly.
  6. 9. A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
  7. 11. _________ occurs when a program tries to store more data in a temporary storage area than it can hold.