Security Crosswords

12345678910
Across
  1. 3. Attacker sends a bogus requests to exhaust system resources.
  2. 4. Person who uses their technical computer skill to breach computer system.
  3. 5. Tool used for network discovery and security auditing.
  4. 9. Test which verifies that unexpected input cannot affect the system in an unpredictable way.
Down
  1. 1. Tool used to test network protocol implementation and other interfaces.
  2. 2. Users require to enter multiple credentials for login.
  3. 6. Design for security.
  4. 7. A remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
  5. 8. Graphical tool used for performing security testing of web applications
  6. 10. Vulnerability scanner for containers and other artifacts.