Across
- 1. Technique or code that takes advantage of a vulnerability.
- 3. Who uses skills to exploit systems or networks.
- 5. Is a technique used to assess the security of web applications by simulating attacks in real-time.
- 7. A potential harm or negative consequences that arise from vulnerabilities and threats.
- 9. Weakness or flaw that can be exploited.
- 10. The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
- 12. Malicious software that aims to damage or compromise systems.
- 14. A disruptive event that compromises the security or integrity.
- 16. A structured approach to developing software with a focus on security.
- 17. A type of security testing that analyzes application source code for vulnerabilities.
Down
- 2. A non-profit organization dedicated to improving software security through open resources and information.
- 4. The process of evaluating and analyzing potential risks and vulnerabilities.
- 6. Condition or circumstance that can cause harm or damage.
- 8. Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
- 11. Confidential or hidden information that is not widely known or shared
- 13. A security assessment that identifies vulnerabilities in computer systems and networks.
- 15. The process of reducing or minimizing the impact or severity.