CEH Chapter 18 Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 4. ICS reconnaissance mapping visualization tool
  2. 6. Side channel power analysis attack platform
  3. 7. OT malware targeting power grid systems
  4. 9. Security model requiring continuous verification
  5. 11. Malware targeting industrial control systems
  6. 14. Industrial communication protocol for PLC systems
  7. 17. Linux debugging tool analyzing program execution
  8. 19. Programmable logic controller industrial device
  9. 23. Debugging tool interfacing with embedded chips
  10. 24. Electronic signal waveform measurement device
  11. 26. Disassembler converting machine code to assembly
  12. 27. Command line tool interacting with PLC
  13. 29. Malware hiding unauthorized privileged access
  14. 31. Process protecting data confidentiality
  15. 33. Reverse engineering software analysis framework
  16. 36. Industrial network protocol for real time control
  17. 37. Passive network packet sniffing analysis tool
  18. 39. Firmware binary analysis extraction tool
  19. 40. Reverse engineering binary analysis framework
Down
  1. 1. Network protocol analysis and packet capture
  2. 2. Network segment isolating internal systems
  3. 3. Network protocol fuzz testing tool
  4. 5. Electrical voltage current measurement device
  5. 8. Vulnerability management and risk analysis platform
  6. 10. Exploitation framework for penetration testing
  7. 12. Network traffic analysis monitoring platform
  8. 13. Software defined radio signal capture device
  9. 15. Industrial control protocol for remote devices
  10. 16. Search engine for internet connected devices
  11. 18. Building automation communication protocol
  12. 20. Industrial network monitoring detection platform
  13. 21. Industrial supervisory control monitoring system
  14. 22. Repeating captured communication signals
  15. 25. Industrial Ethernet protocol for automation
  16. 28. Human machine interface control system display
  17. 30. Passive IoT network traffic monitoring tool
  18. 32. Vulnerability scanning security assessment tool
  19. 34. Electronic circuit design visualization tool
  20. 35. Network security traffic filtering system
  21. 38. Remote terminal unit industrial field device