Hack Your Brain
Across
- 2. A specific type of phishing that targets high-profile individuals, such as executives.
- 5. A technology used to create a secure, encrypted tunnel between two networks.
- 6. A malicious attempt to disrupt a network by overwhelming it with traffic.
- 8. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- 9. A technique where attackers attempt to guess passwords by trying all possible combinations.
- 12. The unauthorized exploitation of a network to access confidential data or systems.
Down
- 1. An individual who uses hacking skills for ethical purposes.
- 3. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- 4. A cybersecurity practice where teams work against each other, with attackers and defenders.
- 7. ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- 10. A widely used asymmetric encryption algorithm named after its inventors.
- 11. ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.