Across
- 3. An attack that exploits an unknown vulnerability in software.
- 5. a software weakness which allows an attacker to gain access to a system.
- 7. A small piece of code used as the payload in exploitation.
- 8. are you dead yet?
- 9. an exploit technique used for malicious code execution
- 10. a common hacking technic that relies on a typographical error when typing the website address into the address bar.
- 14. A table of legitimate files and processes.
- 16. A malware that requests the payment of a fee to unlock encrypted files.
- 20. technology that is designed to detect potential data breaches and prevent them.
- 21. Security company founded by Kevin Mandia
Down
- 1. A common suite for penetration testing and exploitation.
- 2. A form of attack using psychological manipulation of people.
- 4. a social GPS.
- 6. will open the cybertech2014.
- 8. Malicious software, designed to hide its processes or programs.
- 11. Anonymous’s attack against Ukraine government data
- 12. A cyber unit under China’s 2nd Bureau of the PLA.
- 13. Company behind February’s largest security conference.
- 15. A symmetric-key block cipher.
- 17. - A code name made for collecting large amounts of data regarding individuals.
- 18. Using something to one’s own advantage
- 19. An Attempt to acquire information by masquerading as a trustworthy entity.
