Units 8 and 9 vocabulary

1234567891011121314151617181920
Across
  1. 6. An attack that alters records to redirect internet traffic from legit sites to malicious sites.
  2. 9. Small files stored in computers by websites a user visits.
  3. 12. A security process that requires more than one form of verification
  4. 14. The standard programming language used to communicate with databases
  5. 15. Security tool used to distinguish humans from bots
  6. 17. Well defined instructions or procedures designed to perform specific security tasks
  7. 18. Cryptographic function that turns input data into a string of characters
  8. 19. An attack where the attacker intercepts and relays communication between two parties
  9. 20. Attack where a stolen username and password pairs are automated to log into websites
Down
  1. 1. An attack where the attacker systematically uses common words or phrases to steal information and to hack into accounts
  2. 2. An unauthorized attempt to steal, disrupt, or damage data.
  3. 3. Verification method that uses biological features to identify a user
  4. 4. An attack technique where a hacker makes IP packets with a false address in order to impersonate another person.
  5. 5. An attack where the attacker uses a method of trial and error, randomly guesses passwords
  6. 7. Malicious attempt to exploit vulnerabilities in a software
  7. 8. Passwords consisting of both numbers and letters
  8. 10. A specific instruction written in SQL to interact with a database
  9. 11. A temporary code, valid only once, used to verify a users identity
  10. 13. Vulnerability that allows attackers to interfere with queries by inserting malicious SQL code into input fields
  11. 16. Organized collection of structured data