Cybersecurity & Web Exploitation Crossword

123456789101112131415
Across
  1. 5. CSRF attacks use the ___ of other users without their knowledge.
  2. 7. "Access control" is ensuring users cannot act outside of intended ___.
  3. 8. You access web applications with this.
  4. 11. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. 12. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. 14. For security reasons, by default, web apps should not ___ data from the browser.
  7. 15. The OSI model has ___ layers.
Down
  1. 1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. 2. In cybersecurity, blue teams do this.
  3. 3. Acronym for the organization set up to improve software security in 2001.
  4. 4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. 6. What does the "I" in OSI stand for?
  6. 9. In cybersecurity, red teams do this.
  7. 10. ___ hat hackers hack unethically, for personal gain.
  8. 13. ___ sanitization is the modification of user data so that it can't run scripts.