Across
- 4. typical exploit used with bad programming
- 5. type of vulnerability typically used by attackers
- 7. how antivirus software detects viruses
- 9. A ______ attack is a technique where every single combination is tested
- 11. Intrusion ______ Systems are considered passive systems
- 13. MD5 is a ______
Down
- 1. self replicating malware on execution
- 2. ______ testing is a test carried out by sec professionals to check a system
- 3. computer system designed to trap attackers and spam
- 6. number one reconnaissance tool used
- 8. monitoring only does not ______ an attacker
- 10. Using a proxy could be considered to be a man-in-the-______ attack
- 12. malware disguised as a useful application
