Security Testing Concepts

123456789101112
Across
  1. 2. An attack that use fraudulent emails that appear to be from trusted sources to try to trick victims into divulging sensitive data over email. (Hint: --a----)
  2. 5. A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)
  3. 8. It is a malicious program triggered when a logical condition is met. (Hint: ----c----)
  4. 9. Name the hacker who uses hacking to send social, religious, and political, etc messages. (Hint: ---k------)
  5. 11. A program provides a means for ethical hackers to test an organization's website, mobile app, or software for security bugs. (Hint: ---b-----)
  6. 12. It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)
Down
  1. 1. It is one of the common attacking techniques used by hackers to get critical data. (Hint: -----j------)
  2. 3. It is an open source platform and most widely used SAST tool. (Hint: ----r----)
  3. 4. It is a fake computer system that behaves like a real system and attracts hackers to attack it. (Hint: --n-----)
  4. 6. A malicious software that allows an unauthorized user to have access to a computer and restricted areas of its software. (Hint: ---t---)
  5. 7. An information security standard for organizations that handles branded credit cards from the major card schemes. (Hint: ---d--)
  6. 10. A program that will serve pop up ads, can change browser's homepage and bombard your device with advertisements. (Hint: -d----)