Cyentia Institute Crossword

123456789
Across
  1. 3. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  2. 4. A research series dedicated to clearing away the fog of FUD (fear, uncertainty, and doubt) that has plagued cyber risk quantification for far too long.
  3. 6. A company dedicated to building cybersecurity knowledge through data-driven research
  4. 7. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  5. 9. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
Down
  1. 1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. 2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system.
  3. 5. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  4. 8. The hypothetical event wherein an attacker uses the vulnerability.