Cyber CYber

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 2. KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
  2. 4. What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
  3. 7. VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
  4. 9. RECOVERY What term describes a strategy for recovering from a cyber incident?
  5. 12. A security measure that helps prevent unauthorized access to a network?
  6. 15. WEB What term refers to the part of the internet that is not indexed by traditional search engines?
  7. 16. What type of software is potentially unwanted and often bundled with legitimate software?
  8. 17. What type of malware allows remote access to a user's device?
  9. 18. What term refers to a security incident where sensitive data is accessed without authorization?
  10. 19. DETECTION A tool or process for detecting unauthorized access to a system?
  11. 22. A type of cyber attack where the attacker impersonates a legitimate user?
  12. 23. TESTING A systematic examination of a system for security weaknesses?
  13. 26. What term describes malicious code that appears legitimate?
  14. 28. What term is used for a password that is difficult to guess?
  15. 29. Which type of attack sends a flood of traffic to overwhelm a network?
  16. 32. THEFT The unauthorized use of someone's personal data is known as?
  17. 33. FLOOD What type of DDoS attack exploits the TCP handshake process?
  18. 34. What type of encryption uses two different keys for encryption and decryption?
  19. 36. The practice of obtaining sensitive information by deception is known as?
  20. 37. What type of cryptographic attack tries all possible combinations of keys?
Down
  1. 1. A method used to authenticate users based on physical characteristics?
  2. 3. What do you call a security measure that uses two or more methods to verify identity?
  3. 4. A series of steps taken to ensure the security of information systems?
  4. 5. The information that is collected to assess vulnerabilities?
  5. 6. SCANNING What is a method for identifying weaknesses in a system’s security?
  6. 8. What is the process of converting plaintext into ciphertext?
  7. 10. What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
  8. 11. A malicious user who seeks to exploit system vulnerabilities?
  9. 13. The act of attempting to steal data through exploiting weak points?
  10. 14. What refers to the principle of least privilege in cybersecurity?
  11. 16. What technique uses social interactions to manipulate individuals into giving up confidential information?
  12. 20. What type of malware can replicate itself and spread to other computers?
  13. 21. The process of decoding information or data that has been encrypted?
  14. 24. What is a security resource whose value lies in being probed, attacked, or compromised?
  15. 25. A collection of related data that may be exposed during a breach is called?
  16. 27. SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
  17. 30. ATTACK A planned attack to capture sensitive information over a network?
  18. 31. IDS What term refers to a system that captures and stores network traffic?
  19. 35. TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
  20. 36. A malicious email that pretends to be from a trustworthy source?