Across
- 2. Use of fake website
- 4. Actions to inhibit the effectiveness of IDS
- 5. Differentiates between adversarial and non-adversarial risks
- 6. Risk analysis with an assumption that some controls are in place
- 7. Provides information about common vulnerabilities
Down
- 1. Use of multiple PCs to attack a single server
- 3. Type of attack aimed at obtaining login credentials
- 4. Developed by Carnegie Mellon University
