My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

1-C Flashcards (4)

Security + SY0-601 Vocabulary List
Horizontales
Process that defines how the organization will review, approve and implement proposed changes to information systems in a manner that manages both cybersecurity and operational risk
Attacks seeking to insert attacker-written code into the legitimate code created by a web application developer
A metric that describes the difficulty of exploiting a vulnerability
Moving the execution of an application to the cloud on an as-needed basis
Verticales
An intrusion discovery mechanism used by intrusion detection systems (IDs). It finds out about the normal activities and events on your system by watching and learning. *Also known as Statistical Intrusion Detection, Anomaly Detection, and Heuristics-Based Detection*
A kind of SQL injection attack that is conducted when the attacker doesn't have the ability to view the results directly
A document that describes expected behavior of employees and affiliates and covers situations not specifically addressed in policy
Hackers with malicious intent *Also known as unauthorized attackers*
A kind of attacker that focuses on capturing information from cards like RFID and magstripe cards often used for entry access