Cybersecurity Awareness Month 2025

123456789101112131415161718192021222324252627
Across
  1. 6. Applying a mathematical algorithm to data to promote integrity.
  2. 7. Process of accessing and modifying mobile device privileges to bypass OS restrictions.
  3. 12. A collection of analyzed, publicly available information applicable to security questions (acronym)
  4. 13. Sharing the risk with another organization, such as an insurance company.
  5. 15. Any observed, verified, and documented occurrence.
  6. 17. A periodical outbound connection between a compromised computer and an external controller.
  7. 18. Anything of value to an organization
  8. 20. A famous framework used to determine adversarial tactics, techniques, & common knowledge.
  9. 22. A documented history of how evidence was handled, collected, transported, and preserved.
  10. 23. Self-replicating malicious code that spreads across vulnerable networks.
  11. 24. Actions that attempt to deny malicious actors the ability to cause further damage.
  12. 25. An isolated testing environment where security practitioners can detonate and observe malicious payloads.
Down
  1. 1. A piece of code written to add functionality or enhanced features, such as to a web browser.
  2. 2. Type of hold that retains a device in a secure storage area for forensic investigation.
  3. 3. Protocol that provides secure remote access to network devices.
  4. 4. Gray hat hacker whose motivations are socially or politically motivated.
  5. 5. Secondary authentication tool using something you either know, have, or are (acronym).
  6. 8. Proactively examining one's own infrastructure for potential threats.
  7. 9. An intermediary device which acts as a gateway between user devices, applications, and the internet.
  8. 10. Data stored in READ-ONLY memory, which executes when a device is powered on.
  9. 11. A testing methodology where extreme demands are placed on software to determine robustness.
  10. 14. The use of security tools & controls to reduce the risk of a vulnerability to acceptable levels.
  11. 16. A type of "bomb" intentionally inserted into a software system, which detonates under specific conditions.
  12. 19. An action taken to segment an infected host from communicating with the rest of a network.
  13. 21. Global standard for protecting stored, processed, and transmitted credit card info.
  14. 26. List of rules that controls the manner by which network resources may be accessed (acronym).
  15. 27. Actions and technologies used by organizations to prevent loss of sensitive data (acronym).