Cyber security - 5

1234567891011121314
Across
  1. 3. The process of gathering information about a target system.
  2. 5. A centralized unit that deals with security issues.
  3. 7. An unskilled attacker who uses existing tools to launch attacks.
  4. 9. A set of security settings that serve as a benchmark for systems.
  5. 10. A f
  6. 11. An observable occurrence relevant to system security.
  7. 12. Malware designed to gain unauthorized root or administrative access.
  8. 13. Malware that encrypts a victim’s files and demands payment to restore access.
  9. 14. Running untested or untrusted programs in isolation to prevent damage.
Down
  1. 1. An evaluation of an organization’s security policies and systems.
  2. 2. Identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize or control their impact.
  3. 4. A protocol for secure remote login and command execution.
  4. 6. Simulated attackers and defenders security testing.
  5. 7. The practice of writing software that is resistant to attacks.
  6. 8. Analyzing a system to understand its design and vulnerabilities.