Cyber Club

123456789
Across
  1. 2. A proactive threat-hunting exercise simulating adversarial behavior.
  2. 4. Perimeter security control filtering inbound and outbound traffic based on policy.
  3. 7. Attack technique exploiting excessive permissions to gain higher-level access
  4. 8. Data protection technique replacing sensitive information with non-sensitive equivalents.
  5. 9. Malware disguised as legitimate software to trick users into execution.
Down
  1. 1. Cryptographic mechanism ensuring non-repudiation and integrity of digital communications.
  2. 3. Security platform aggregating and correlating logs for real-time threat detection.
  3. 5. Fraud method targeting executives or finance teams using impersonation.
  4. 6. A security model that assumes breach and verifies every access request regardless of network location.