Cyber Intelligence (Medium)
Across
- 2. The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
- 4. An individual or group that carries out cyber attacks for political or ideological reasons.
- 6. A technique used to gather intelligence by infiltrating target networks or systems.
- 7. A technique used to gather intelligence by monitoring and analyzing public sources of information.
- 9. A covert technique used to gain unauthorized access to a computer system.
- 10. A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
- 11. The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
- 1. The process of identifying and mapping potential vulnerabilities in a system or network.
- 3. a centralized team responsible for monitoring and responding to security incidents.
- 5. A software program that disguises itself as a legitimate program but performs malicious activities.
- 8. The proactive search for indicators of compromise and potential threats within a network or system.