Cybersecurity Fundamental Chapter 7
Across
- 5. A model used in cybersecurity to describe the stages of an information systems attack.
- 7. Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
- 8. The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
- 10. The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
- 12. A technology used for tracking and identifying objects using radio waves.
- 13. The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
- 14. The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
- 16. The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
- 1. The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
- 2. The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
- 3. Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
- 4. Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
- 6. The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
- 9. The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
- 11. Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
- 15. Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.