Across
- 3. Encryption method that uses the same key for encryption and decryption.
- 5. Malicious email technique used to trick users into revealing passwords.
- 8. Attack that injects malicious SQL queries into applications.
- 10. Manipulating people to reveal confidential information.
Down
- 1. Framework used to develop and test exploit code.
- 2. Tool used for network scanning and port discovery.
- 4. Legal document ethical hackers must obtain before testing.
- 6. Practice of legally testing systems to identify security vulnerabilities.
- 7. Type of attack that floods a system to deny access to legitimate users.
- 9. Tool used for capturing and analyzing network packets.
