1 11 13
2
3
4/9 10
12
5
6
7
8

Crossword: Network Security

Across

1. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.

2. An electronic document that confirms the credibility of a sender or receiver in a network communication.

3. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.

4. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.

5. A piece of information used to authenticate a user's identity, such as a password or biometric data.

6. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.

7. A cryptographic system that uses the same key for both encryption and decryption.

8. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.

Down

9. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.

10. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.

11. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.

12. An attack where an attacker physically taps into a network cable to intercept data passing through.

13. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓