Across
- 6. An attack that alters records to redirect internet traffic from legit sites to malicious sites.
- 9. Small files stored in computers by websites a user visits.
- 12. A security process that requires more than one form of verification
- 14. The standard programming language used to communicate with databases
- 15. Security tool used to distinguish humans from bots
- 17. Well defined instructions or procedures designed to perform specific security tasks
- 18. Cryptographic function that turns input data into a string of characters
- 19. An attack where the attacker intercepts and relays communication between two parties
- 20. Attack where a stolen username and password pairs are automated to log into websites
Down
- 1. An attack where the attacker systematically uses common words or phrases to steal information and to hack into accounts
- 2. An unauthorized attempt to steal, disrupt, or damage data.
- 3. Verification method that uses biological features to identify a user
- 4. An attack technique where a hacker makes IP packets with a false address in order to impersonate another person.
- 5. An attack where the attacker uses a method of trial and error, randomly guesses passwords
- 7. Malicious attempt to exploit vulnerabilities in a software
- 8. Passwords consisting of both numbers and letters
- 10. A specific instruction written in SQL to interact with a database
- 11. A temporary code, valid only once, used to verify a users identity
- 13. Vulnerability that allows attackers to interfere with queries by inserting malicious SQL code into input fields
- 16. Organized collection of structured data
