New Activity
Play Crossword Puzzle
1 A known or unknown weakness in a website that could result in the loss of a website's confidentiality, integrity, and/or availability.
2 This compromise will directly, or indirectly, link a website to a blacklisted website. The goal of this compromise it to get the infected site blacklisted as well.
3 This compromise happens when malicious SQL statements, or commands, are inserted into an entry field of a website in order to attack the database of the site.
4 These are input fields that are usually used in a form that is part of a web-page.
5 This has happened when a threat has exploited a vulnerability in a website and has affected a website's confidentiality, integrity, and/or availability. Also known as a hack.
6 This compromise occurs when a website is replaced with a site that a hacker puts up, commonly a one-page site glorifying the hacker, hacking group, and/or displays an opinion or belief of the hacker.
7 This compromise occurs when a website is accessed online but the visitor is taken to an unintended site. This is also known as a .htaccess hack.
8 This file is commonly found on sites that have had several attacks within a small period and allows hackers easy access to a website; they can come and go as they please.
9 This compromise will put ads for things like pharma, Gucci, Nike, Prada, etc., by way of backlinks, hyperlinks, or headers on a website.
10 This could take advantage of a website's vulnerabilities and result in a loss of a website's confidentiality, integrity, and/or availability.
11 This is the file within a website that is in charge of displaying the initial page (home page) you see when a website is viewed.
12 A likelihood that a threat will exploit vulnerabilities and cause damage, or danger, to a customer's website or its visitors. Risk can be avoided through preemptive action. 4. A threat is what could take advantage of a website's vulnerabilities and result in a loss of a website's confidentiality, integrity, and/or availability.
13 This compromise tries to shut down a server, or website, by trying to overwhelm it and make it inaccessible by flooding it with malicious, or fake, requests. 14. WAF stands for Web Application Firewall and is used to block malicious traffic, or requests, in order to protect websites from hackers, bots, scrapers, and spammers.
14 This compromise happens when JavaScript and/or HTML is inserted into an entry field of a website in order to alter the functionality of the site and launch phishing attacks on website visitors.
15 This is a program or automated script that browse the Internet with a specific purpose and is completely automated. It is also known as a hack.
15
2
10
12
14
3
5
4
1
8
7
11
9
6
13