Network Security

12345678910111213
Across
  1. 4. typical exploit used with bad programming
  2. 5. type of vulnerability typically used by attackers
  3. 7. how antivirus software detects viruses
  4. 9. A ______ attack is a technique where every single combination is tested
  5. 11. Intrusion ______ Systems are considered passive systems
  6. 13. MD5 is a ______
Down
  1. 1. self replicating malware on execution
  2. 2. ______ testing is a test carried out by sec professionals to check a system
  3. 3. computer system designed to trap attackers and spam
  4. 6. number one reconnaissance tool used
  5. 8. monitoring only does not ______ an attacker
  6. 10. Using a proxy could be considered to be a man-in-the-______ attack
  7. 12. malware disguised as a useful application