ICS puzzle

123456789101112131415161718192021222324252627
Across
  1. 8. the process of converting coded or encrypted data to its original form.
  2. 9. attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
  3. 11. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  4. 13. a form of malware that distributes itself by transferring copies of itself to other computers across the network.
  5. 14. attack swamps a website with so much traffic that it simply can’t cope
  6. 17. a technique used by threat actors to leverage a vulnerability in order to compromise a system.
  7. 19. a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
  8. 22. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
  9. 24. A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
  10. 25. an identity verification process
  11. 26. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
  12. 27. A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
  1. 1. a program used to prevent, identify, and remove viruses and other malicious software from your computer.
  2. 2. A copy of files and programs made to facilitate recovery, if necessary.
  3. 3. an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
  4. 4. perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
  5. 5. a modern security strategy based on the principle never trust, always verify.
  6. 6. a network security device, it creates a barrier between a trusted network and an untrustworthy network.
  7. 7. A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
  8. 10. A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
  9. 11. Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
  10. 12. Unauthorized act of bypassing the security mechanisms of a system.
  11. 15. Any circumstance or event with the potential to adversely impact organizational operations.
  12. 16. an encrypted internet connection to provide a secure connection.
  13. 18. a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
  14. 20. An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
  15. 21. an unintended software or hardware problem
  16. 23. An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.