Cyber security - 5
Across
- 3. The process of gathering information about a target system.
- 5. A centralized unit that deals with security issues.
- 7. An unskilled attacker who uses existing tools to launch attacks.
- 9. A set of security settings that serve as a benchmark for systems.
- 10. A f
- 11. An observable occurrence relevant to system security.
- 12. Malware designed to gain unauthorized root or administrative access.
- 13. Malware that encrypts a victim’s files and demands payment to restore access.
- 14. Running untested or untrusted programs in isolation to prevent damage.
Down
- 1. An evaluation of an organization’s security policies and systems.
- 2. Identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize or control their impact.
- 4. A protocol for secure remote login and command execution.
- 6. Simulated attackers and defenders security testing.
- 7. The practice of writing software that is resistant to attacks.
- 8. Analyzing a system to understand its design and vulnerabilities.