CS
Across
- 7. The act of secretly listening to or monitoring communication between two parties, often to steal sensitive data. (13)
- 8. A decoy system or server designed to lure cybercriminals and detect malicious activities. (7)
- 9. A security technique that isolates applications or processes in a controlled environment to prevent them from affecting the rest of the system. (10)
- 10. An open standard for secure, passwordless authentication which is also available for authenticating into EKAMEV from smartphones. (4)
- 14. A hidden entry point into a system, often used by attackers. (8)
- 15. A policy that allows employees to use personal devices (like smartphones/ laptop) for work, potentially introducing security risks. (4)
- 16. A software update designed to fix vulnerabilities. (5)
- 17. _____________ Detection System is employed for monitoring network traffic for security breaches. (9)
- 18. – The I of the CIA triad of cybersecurity. (9)
- 19. A type of social engineering attack where voice communication (usually over the phone) is used to trick individuals into revealing personal information. (7)
- 21. A physical security measure involving a small, secure space where individuals are authenticated before entering a facility. (6)
- 22. A zone in the network segment that acts as a buffer between an internal network and external networks, often used to host public-facing services (13)
- 23. The ChatGPT equivalent application of the office (6)
- 24. A testing technique used to identify vulnerabilities in software by inputting random, unexpected, or malformed data. (4)
Down
- 1. The individual who controls and directs a botnet to perform malicious activities. (9)
- 2. A type of phishing attack that targets high-level executives to steal sensitive information. (7)
- 3. A wireless communication protocol often used in IoT devices that can be susceptible to security vulnerabilities. (6)
- 4. Malware that records keystrokes on a device to steal sensitive information such as passwords.(9)
- 5. A vulnerability that is exploited by attackers before the software developer can patch it. (4-3)
- 6. The process of substituting sensitive data with a unique identifier or token that retains its meaning but is useless if breached. (12)
- 11. Unauthorized use of a system's resources to mine cryptocurrency. (13)
- 12. The certifying authority that issues digital certificates for accessing CBS in the office (5)
- 13. Redirecting a website’s traffic to a fake version of the site to steal information. (8)
- 20. Malicious software designed to conceal its presence on a compromised system and provide privileged access. (7)
- 22. The process of using a magnetic field to destroy data stored on magnetic media like hard drives or tapes. (10)