Across
- 5. Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
- 6. A program/attack used by which the cracked/attacked part of network is inoperable
- 7. The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
- 8. A harmful software program in disguise
- 9. The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
- 11. Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
- 12. If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
- 1. A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
- 2. URL when added in this list can bypass all the Enforcement filters.
- 3. The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
- 4. Cryptographic transformation of data results in ________ text
- 7. Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
- 10. Attack through which the system gets compromised by trying only a possible set of passwords
