Crossword-InfoSec
Across
- 2. It's not an insect, but crawls and replicates within a network
- 4. A challenge-response test to determine human users
- 7. A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
- 9. It records everything that you type.
- 11. Malicious activity by internal users. It’s sometimes unintentional also.
- 13. A spy software that intends to compromise your personal information
- 14. Collection of hijacked systems to carry out a large-scale flood attack
Down
- 1. Exploiting the human element to obtain sensitive information
- 3. If you are cautious, you will use multi-level authentication
- 5. Disguised cyber-criminal pretend to commit malicious acts
- 6. A targeted cyber attack to steal critical and classified information of an organization or entity
- 8. Process of converting encrypted data into readable form
- 10. An intelligently crafted software intended to harm your system
- 12. Flooding victims with unwanted requests to restrict the availability of services
- 13. An isolated environment to test, research, and analyze without affecting the production environment