Security CrossWord

123456789101112
Across
  1. 5. Who use their dexterity/proficiency explicitly for vicious ends like compromising the application and getting confidential data with viruses or phishing
  2. 6. A program/attack used by which the cracked/attacked part of network is inoperable
  3. 7. The Secure layer before executing any request that performs Request, Parameter, Header and cookie size checks in CITI related applications
  4. 8. A harmful software program in disguise
  5. 9. The Security Filter developed by CITI to validate the request parameters to mach predefined regex patterns
  6. 11. Anti-Automation Security that was implemented across CITI applications to prevent Denial Of Service attack.
  7. 12. If this technique is implemented the rainbow tables which are generally created by hackers cannot be created before the attack
Down
  1. 1. A set of machines that have been trapped by a virus, worm etc., and placed under the control of one or more
  2. 2. URL when added in this list can bypass all the Enforcement filters.
  3. 3. The Security feature developed by CITI that validates the threshold limits for actions by having a centralized/distributed monitoring on each JVM
  4. 4. Cryptographic transformation of data results in ________ text
  5. 7. Attack where the cyber attackers specifically targets for less number of individuals or to specific groups
  6. 10. Attack through which the system gets compromised by trying only a possible set of passwords