Crossword 3
Across
- 1. Post Office Protocol
- 3. An attack that seeks to obtain information from a victim by presenting false credentials or by luring the victim to an attack site
- 4. NetBIOS Extended User Interface
- 8. A collection of multiple honeypots in a network for the purpose of luring and trapping hackers
- 10. Simple Mail Transfer Protocol
- 11. The process of making copies of data onto other storage media
- 13. Malware that records all keyboard input and transmits a log file to a hacker
- 16. Security Technical Implementation Guides
- 17. A protocol and a service used to remotely control or administer a host through a plaintext command line interface
Down
- 1. A leetspeak word derived from a common typo. Used to mean hacking and taking over control of a computer or network
- 2. Malware that needs a host object to infect
- 3. Using a new service, device, configuration, software, etc. to a limited number of test hosts before deploying over the entire network
- 5. Bring Your Own Device
- 6. A closely monitored system that usually contains a large number of files that appears to be valuable or sensitive and serves as a trap for hackers
- 7. A network mapping tool that performs network scanning, port scanning, OS identification, and other types of probing
- 9. Basic security training that focuses on common or basic security elements that all employees must know and abide by
- 12. Malware that acts like an electronic land mine
- 14. An advancement of keystroke logging to monitor and record many other user activities.
- 15. A form of Malware that hackers can upload and deploy on a target system, replacing multiple, components of the host’s operating system with altered code
- 18. Trusted Platform Module