Across
- 3. Attacker sends a bogus requests to exhaust system resources.
- 4. Person who uses their technical computer skill to breach computer system.
- 5. Tool used for network discovery and security auditing.
- 9. Test which verifies that unexpected input cannot affect the system in an unpredictable way.
Down
- 1. Tool used to test network protocol implementation and other interfaces.
- 2. Users require to enter multiple credentials for login.
- 6. Design for security.
- 7. A remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
- 8. Graphical tool used for performing security testing of web applications
- 10. Vulnerability scanner for containers and other artifacts.
