Crossword 3

123456789101112131415161718
Across
  1. 1. Post Office Protocol
  2. 3. An attack that seeks to obtain information from a victim by presenting false credentials or by luring the victim to an attack site
  3. 4. NetBIOS Extended User Interface
  4. 8. A collection of multiple honeypots in a network for the purpose of luring and trapping hackers
  5. 10. Simple Mail Transfer Protocol
  6. 11. The process of making copies of data onto other storage media
  7. 13. Malware that records all keyboard input and transmits a log file to a hacker
  8. 16. Security Technical Implementation Guides
  9. 17. A protocol and a service used to remotely control or administer a host through a plaintext command line interface
Down
  1. 1. A leetspeak word derived from a common typo. Used to mean hacking and taking over control of a computer or network
  2. 2. Malware that needs a host object to infect
  3. 3. Using a new service, device, configuration, software, etc. to a limited number of test hosts before deploying over the entire network
  4. 5. Bring Your Own Device
  5. 6. A closely monitored system that usually contains a large number of files that appears to be valuable or sensitive and serves as a trap for hackers
  6. 7. A network mapping tool that performs network scanning, port scanning, OS identification, and other types of probing
  7. 9. Basic security training that focuses on common or basic security elements that all employees must know and abide by
  8. 12. Malware that acts like an electronic land mine
  9. 14. An advancement of keystroke logging to monitor and record many other user activities.
  10. 15. A form of Malware that hackers can upload and deploy on a target system, replacing multiple, components of the host’s operating system with altered code
  11. 18. Trusted Platform Module