Crossword-InfoSec

123456789101112131415
Across
  1. 3. A challenge-response test to determine human users
  2. 7. An isolated environment to test, research, and analyze without affecting the production environment
  3. 9. Process of converting encrypted data into readable form
  4. 10. A spy software that intends to compromise your personal information
  5. 11. An intelligently crafted software, with the intent to harm your system
  6. 12. A targeted cyber attack to steal critical and classified information of an organization or entity
  7. 13. Exploiting the human element to obtain sensitive information
  8. 14. It's not an insect, but crawls and replicates within a network
  9. 15. If you are cautious, you will use multi-level authentication
Down
  1. 1. Collection of hijacked systems to carry out a large-scale flood attack
  2. 2. Flooding victims with unwanted requests to restrict the availability of services
  3. 4. Malicious activity by internal users. It’s sometimes unintentional also.
  4. 5. It records everything that you type.
  5. 6. A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
  6. 8. Disguised cyber-criminals pretend to commit malicious acts