Cyentia Institute Crossword
Across
- 3. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 4. A research series dedicated to clearing away the fog of FUD (fear, uncertainty, and doubt) that has plagued cyber risk quantification for far too long.
- 6. A company dedicated to building cybersecurity knowledge through data-driven research
- 7. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 9. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
- 1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system.
- 5. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- 8. The hypothetical event wherein an attacker uses the vulnerability.