Crossword-InfoSec
Across
- 3. A challenge-response test to determine human users
- 7. An isolated environment to test, research, and analyze without affecting the production environment
- 9. Process of converting encrypted data into readable form
- 10. A spy software that intends to compromise your personal information
- 11. An intelligently crafted software, with the intent to harm your system
- 12. A targeted cyber attack to steal critical and classified information of an organization or entity
- 13. Exploiting the human element to obtain sensitive information
- 14. It's not an insect, but crawls and replicates within a network
- 15. If you are cautious, you will use multi-level authentication
Down
- 1. Collection of hijacked systems to carry out a large-scale flood attack
- 2. Flooding victims with unwanted requests to restrict the availability of services
- 4. Malicious activity by internal users. It’s sometimes unintentional also.
- 5. It records everything that you type.
- 6. A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
- 8. Disguised cyber-criminals pretend to commit malicious acts