Across
- 2. inserts statements to manipulate a database server
- 3. hiding data within an ordinary, nonsecret file
- 8. Removing user accounts
- 13. ensuring that an organization adheres to laws and regulations
- 16. It only goes off after certain conditions are met
- 21. Subset of the board that manages governance issues
- 24. bruteforce collision attack that exploits the probability theory
- 25. Threat actors who are strongly motivated by philosophical or political beliefs.
- 26. involves isolating sensitive enterprise data
- 29. pose a threat from the position of a trusted entity
- 30. refers to integrating security into the application
- 32. A device that distributes work across a network
- 33. An attack that copies data and then uses it
- 35. The entity that is responsible for digital certificates
- 36. Individual or entity who is responsible for attacks
- 37. is a finite sequence of rigorous instructions
- 38. Data that is encapsulated within a secure outer shell
- 39. Threat actors who are employed by their own government to carry out attacks
Down
- 1. Vulnerability for which there are no days of advanced warning
- 4. The rapid detection and elevation of a threat incident
- 5. A downgrade attack
- 6. server within the DMZ that is used to connect two dissimilar security zones
- 7. features and characteristics of the individual
- 9. two or more different messages that produce the same hash value
- 10. Standard preconfigured passwords
- 11. decentralized, distributed and public digital ledger
- 12. An AP set up by an attacker to mimic an authorized AP
- 14. A malicious program that uses a computer network to replicate
- 15. Closing unused ports and disabling unnecessary protocols
- 17. resource that is not possible due to geography
- 18. An unauthorized AP that allows an attacker to bypass many of the network security
- 19. denial of the truth or validity of something
- 20. validate a main domain along with all subdomains
- 22. evidence or proof of something
- 23. A product that consolidates real-time security monitoring and management
- 27. performs a real-time lookup of a certificate’s status
- 28. unauthorized copying of data
- 29. object whose state cannot be modified after it is created
- 31. Identifying and mitigating risks brought on by a third party
- 34. retains historical documents
