Cybersecurity Training Exercise

123456789101112131415161718192021
Across
  1. 4. *You can thank MIT for this term that once described quick and dirty code that was functional but not stable*
  2. 6. A network of computers infected by malware that are under the control of a single attacking party
  3. 7. *Occam says that a principle that states that the simplest explanation is usually the best*
  4. 9. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  5. 12. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  6. 14. Computer security programs that simulate network resources that hackers are likely to look for to trap them
  7. 18. *0b11111101000, but in words*
  8. 19. Type of internet fraud that seeks to acquire a user’s credentials by deception
  9. 20. A security system that forms a virtual perimeter around a network of workstations
  10. 21. Code that has been written to take advantage of a vulnerability before the software vendor knows about it and can publish a patch for it
Down
  1. 1. Weaknesses in software programs
  2. 2. Every RazorPower Co. employee's favorite drink!
  3. 3. Any type of intrusive computer software with malicious intent against the user
  4. 5. Tricking someone into clicking on one object on a web page while they think they are clicking on another
  5. 8. Malicious computer program that is often sent as an email attachment or a download
  6. 10. protecting personal privacy and proprietary information
  7. 11. The process of decoding cipher text to plain text
  8. 13. Data is complete, trustworthy and has not been modified
  9. 15. The property of being genuine and being able to be verified and trusted
  10. 16. Everyday objects that are connected to the internet and are able to collect and transfer data automatically
  11. 17. Malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data