Cybersecurity

12345678910
Across
  1. 4. A cryptographic attack on hash collisions
  2. 6. A sudden unplanned event.
  3. 7. Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
  4. 9. An attack that seeks to obtain personal or private financial information through domain spoofing
  5. 10. The action of multiple attackers planning a cyberattack
Down
  1. 1. The art of exploiting bugs and weaknesses that exist in the telephone system
  2. 2. A process of changing hardware and software configurations to make computers and devices as secure as possible.
  3. 3. The capture and monitoring of network IP packets using a packet sniffer
  4. 5. A type of fraud in which an attacker attempts to trick the victim into providing private information.
  5. 8. The act of unscrambling ciphertext into plaintext