Across
- 5. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
- 8. type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- 10. approval, permission, or empowerment for someone or something to do something.
- 11. basic communication language or "protocol" of the Internet.
- 13. TCP/IP protocol specifying the transfer of text or binary files across the network.
- 15. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
- 1. encrypted form of the message being sent.
- 2. process of confirming the correctness of the claimed identity.
- 3. prove that a user sent a message and the message has not been altered.
- 4. software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- 6. sequence of eight bits.
- 7. pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- 9. stripping one layer's headers and passing the rest of the packet up to next higher layer.
- 12. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- 14. cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.