CyberFun
Across
- 2. An attack that prevents or impairs the authorized use of information system resources or services.
- 4. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- 7. The process of transforming plaintext into ciphertext.
- 8. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
- 9. The property of being accessible and usable upon demand.
- 11. A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.
- 12. A collection of computers compromised by malicious code and controlled across a network.
- 13. The process of verifying the identity or other attributes of an entity (user, process, or device).
Down
- 1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- 3. A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group
- 5. A technique to breach the security of a network or information system in violation of security policy.
- 6. An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
- 10. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
- 11. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.