Across
- 3. A bug where user input is passed as the format argument to printf
- 5. This is when an application reveals sensitive data
- 7. determines strength and validity of passwords.
- 8. A secret entry point into a program.
- 11. can undermine the controls that secure the data of millions
- 14. The result of a mismatch between arithmetic and mathematical arithmetic
- 15. The web server account is incorrectly given access to the system files
- 16. Is the manipulation of people to divulge information or performing actions.
Down
- 1. Somebody who gains illegal access to a phones system.
- 2. An attempt to crack a password by using every combination of letters and digits until a password is cracked.
- 4. bypassing standard authentication or encryption in a computer.
- 6. Mother Nature's actions
- 9. A trapdoor in software that allows easy maintenance
- 10. A subset of the Trojan horse malware.
- 12. A system used to gain authentications by cracking a password hash.
- 13. when a hacker exploits the vulnerability before its fixed.