Cyber CYber
Across
- 2. KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
- 4. What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
- 7. VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
- 9. RECOVERY What term describes a strategy for recovering from a cyber incident?
- 12. A security measure that helps prevent unauthorized access to a network?
- 15. WEB What term refers to the part of the internet that is not indexed by traditional search engines?
- 16. What type of software is potentially unwanted and often bundled with legitimate software?
- 17. What type of malware allows remote access to a user's device?
- 18. What term refers to a security incident where sensitive data is accessed without authorization?
- 19. DETECTION A tool or process for detecting unauthorized access to a system?
- 22. A type of cyber attack where the attacker impersonates a legitimate user?
- 23. TESTING A systematic examination of a system for security weaknesses?
- 26. What term describes malicious code that appears legitimate?
- 28. What term is used for a password that is difficult to guess?
- 29. Which type of attack sends a flood of traffic to overwhelm a network?
- 32. THEFT The unauthorized use of someone's personal data is known as?
- 33. FLOOD What type of DDoS attack exploits the TCP handshake process?
- 34. What type of encryption uses two different keys for encryption and decryption?
- 36. The practice of obtaining sensitive information by deception is known as?
- 37. What type of cryptographic attack tries all possible combinations of keys?
Down
- 1. A method used to authenticate users based on physical characteristics?
- 3. What do you call a security measure that uses two or more methods to verify identity?
- 4. A series of steps taken to ensure the security of information systems?
- 5. The information that is collected to assess vulnerabilities?
- 6. SCANNING What is a method for identifying weaknesses in a system’s security?
- 8. What is the process of converting plaintext into ciphertext?
- 10. What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
- 11. A malicious user who seeks to exploit system vulnerabilities?
- 13. The act of attempting to steal data through exploiting weak points?
- 14. What refers to the principle of least privilege in cybersecurity?
- 16. What technique uses social interactions to manipulate individuals into giving up confidential information?
- 20. What type of malware can replicate itself and spread to other computers?
- 21. The process of decoding information or data that has been encrypted?
- 24. What is a security resource whose value lies in being probed, attacked, or compromised?
- 25. A collection of related data that may be exposed during a breach is called?
- 27. SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
- 30. ATTACK A planned attack to capture sensitive information over a network?
- 31. IDS What term refers to a system that captures and stores network traffic?
- 35. TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
- 36. A malicious email that pretends to be from a trustworthy source?