My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

S-Z Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
A software development method that uses well-defined sequential phases
A concept that is similar to separation of duties but with an important differences: Instead of preventing the same person from holding two different privileges that are sensitive when used together
The IP that a load balancer presents to systems that represents the service it provides *What does this acronym stand for?
A kind of attack that attempts to compromise devices, systems, or software before it even reaches the organization
Suite of network protocols used to transfer information between systems in a standardized format *The primary mechanism used to transport data on mondern networks *What does this acronym stand for?
A code review that relies on software or other tools to manage and assist the code review process
Stored cross-site scripting code on a remote web server in an approach
Allows the connection of VPCs to each other using the cloud provider's secure network backbone
A feed of information about vulnerabilities used by vulnerability scanners and other devices and systems to ensure that vulnerability identification and validation are current and up-to-date
Verticales
An open source tool used to edit and replay network traffic
The process of ensuring that redirects are coming from the expected redirection page or site through one of a variety of technical means
A security device that includes traditional functions of a firewall such as packet filtering and stateful inspection *It is able to perform packet inspection techniques, allowing it to identify and block malicious traffic *Also known as Next-Generation Firewall* *What does this acronym stand for?
A cipher that uses an encryption algorithm to rearrange the letters of a plain-text message to form the ciphertext message
Controls that rely on technology
A type of exercise that takes a team through an incident step-by-step
A windows utility used to determine the network path between two systems *Linux systems use this similar command
A malicious web-based shell-like interface that allows the attacker to execute commands on the server and view the results in the browser
A program intended to damage a computer system