Icon Créer jeu Créer jeu

Crossword - Vul & Compromises

Mots Croisés

Complete this crossword pertaining to what you learned during the Vulnerabilities & Compromises discussions.

Téléchargez la version pour jouer sur papier

12 fois fait

Créé par

United States

Top 10 résultats

Il n'y a toujours pas de résultats pour ce jeu. Soyez le premier à apparaître dans le classement! pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

Crossword - Vul & CompromisesVersion en ligne

Complete this crossword pertaining to what you learned during the Vulnerabilities & Compromises discussions.

par Kerry Williams
1

A known or unknown weakness in a website that could result in the loss of a website's confidentiality, integrity, and/or availability.

2

This compromise will directly, or indirectly, link a website to a blacklisted website. The goal of this compromise it to get the infected site blacklisted as well.

3

This compromise happens when malicious SQL statements, or commands, are inserted into an entry field of a website in order to attack the database of the site.

4

These are input fields that are usually used in a form that is part of a web-page.

5

This has happened when a threat has exploited a vulnerability in a website and has affected a website's confidentiality, integrity, and/or availability. Also known as a hack.

6

This compromise occurs when a website is replaced with a site that a hacker puts up, commonly a one-page site glorifying the hacker, hacking group, and/or displays an opinion or belief of the hacker.

7

This compromise occurs when a website is accessed online but the visitor is taken to an unintended site. This is also known as a .htaccess hack.

8

This file is commonly found on sites that have had several attacks within a small period and allows hackers easy access to a website; they can come and go as they please.

9

This compromise will put ads for things like pharma, Gucci, Nike, Prada, etc., by way of backlinks, hyperlinks, or headers on a website.

10

This could take advantage of a website's vulnerabilities and result in a loss of a website's confidentiality, integrity, and/or availability.

11

This is the file within a website that is in charge of displaying the initial page (home page) you see when a website is viewed.

12

A likelihood that a threat will exploit vulnerabilities and cause damage, or danger, to a customer's website or its visitors. Risk can be avoided through preemptive action. 4. A threat is what could take advantage of a website's vulnerabilities and result in a loss of a website's confidentiality, integrity, and/or availability.

13

This compromise tries to shut down a server, or website, by trying to overwhelm it and make it inaccessible by flooding it with malicious, or fake, requests. 14. WAF stands for Web Application Firewall and is used to block malicious traffic, or requests, in order to protect websites from hackers, bots, scrapers, and spammers.

14

This compromise happens when JavaScript and/or HTML is inserted into an entry field of a website in order to alter the functionality of the site and launch phishing attacks on website visitors.

15

This is a program or automated script that browse the Internet with a specific purpose and is completely automated. It is also known as a hack.

15
2
10
12
14
5
4
1
8
7
11
9
6
13
educaplay suscripción