Across
- 2. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- 3. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- 6. approval, permission, or empowerment for someone or something to do something.
- 9. basic communication language or "protocol" of the Internet.
- 11. sequence of eight bits.
- 12. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- 13. encrypted form of the message being sent.
- 14. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
- 15. repudiation prove that a user sent a message and the message has not been altered.
Down
- 1. stripping one layer's headers and passing the rest of the packet up to next higher layer.
- 4. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- 5. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
- 7. process of confirming the correctness of the claimed identity.
- 8. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- 10. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.