Cyber Club
Across
- 2. A proactive threat-hunting exercise simulating adversarial behavior.
- 4. Perimeter security control filtering inbound and outbound traffic based on policy.
- 7. Attack technique exploiting excessive permissions to gain higher-level access
- 8. Data protection technique replacing sensitive information with non-sensitive equivalents.
- 9. Malware disguised as legitimate software to trick users into execution.
Down
- 1. Cryptographic mechanism ensuring non-repudiation and integrity of digital communications.
- 3. Security platform aggregating and correlating logs for real-time threat detection.
- 5. Fraud method targeting executives or finance teams using impersonation.
- 6. A security model that assumes breach and verifies every access request regardless of network location.