1 14
2
3
4
5
6/13 15
7
8
9
10
11
12

Crossword: Network Security

Across

1. Software designed to detect and remove malicious software, such as viruses, from computer systems.

2. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.

3. The act of manipulating people into performing actions or divulging confidential information.

4. Individuals or groups who control and manage botnets of infected devices.

5. Security risks posed by individuals within an organization, such as employees or former employees.

6. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.

7. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.

8. The process of filtering and validating user input before using it in an application.

9. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.

10. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.

11. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.

12. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.

Down

13. A fraudulent site created to mimic a legitimate platform.

14. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.

15. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓