REV Cybersecurity Awareness Crossword Puzzle # 3

123456789101112131415
Across
  1. 2. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  2. 3. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. 6. approval, permission, or empowerment for someone or something to do something.
  4. 9. basic communication language or "protocol" of the Internet.
  5. 11. sequence of eight bits.
  6. 12. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  7. 13. encrypted form of the message being sent.
  8. 14. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
  9. 15. repudiation prove that a user sent a message and the message has not been altered.
Down
  1. 1. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  2. 4. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
  3. 5. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
  4. 7. process of confirming the correctness of the claimed identity.
  5. 8. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  6. 10. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.