My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

S-Z Flashcards (5)

Security + SY0-601 Vocabulary List
Horizontales
A system that relies on patterns, rhythms, and the sounds of a user's voice itself to recognize the user
Identifying specific vulnerabilities in your network
A type of metadata that is embedded into websites as part of the code of the websites but that is often invisible to everyday users
A document that lays out a mandatory process that merchants suspecting a credit card compromise must follow, typically provided by a merchant bank or credit card company
Emulating one or more physical computers on the same host
Any application that masquerades as one thing in order to get past scrutiny and then does something malicious *They tend not to replicate themselves
An exercise that involves individuals sitting around a table with a facilitator discussing situations that could arise and how best to respond to them
Verticales
The process of breaking out of the constraints of a virtual machine environment at attack or compromise the host system of software
An Industrial Control System (ICS) unit that can operate as a standalone device, can be networked with other systems like this or can be networked with traditional IT systems *What does this acronym stand for?
SQL statements written and stored on the database that can be called by applications
An attack that takes advantage of websites that redirect users to arbitrary URLs without vetting those URLs to ensure that they are on preapproved list or otherwise safe
The path or means by which an attack can gain access to a target in order to cause harm *Also known as the attack vector
A software simulation of a computer within which a process executes *This has its own memory address space, and communication between these machines are securely controlled *What does this acronym stand for?
Systems or administrators apply electronic tags to sensitive documents; crypted content containing those tags
A command-line packet capture tool available by default
A specification for a crypto processor as well as the chip in a mainboard supporting this function *This is used to store and process cryptographic keys for the purpose of a hardware-supported-or-implemented hard drive encryption systems *What does this acronym stand for?