Information Security Crossword
Across
- 1. Malicious software that demands a ransom. (First Letter R, Last Letter E)
- 4. This cloud-based platform acts as a guardian, inspecting and securing your internet traffic regardless of your location. What is the name of this protective service? (First Letter Z, Last Letter R)
- 7. Practice of ensuring that information is disclosed only to authorized individuals. (First Letter C, Last Letter Y)
- 9. This software serves as a secure vault for your digital keys. It not only stores passwords but also helps generate complex ones. What am I? (First Letter K, Last Letter S)
- 14. In access control systems, this security feature prevents a person from using the same access card or credential to enter an area twice in quick succession. What is this measure known as? (First Letter A, Last Letter K)
- 15. A secure, digital quarantine zone where suspicious files are brought for observation and testing, shielding your system from potential threats. (First Letter S, Last Letter X)
- 16. This proactive evaluation method involves simulated attacks on computer systems or networks to assess vulnerabilities and weaknesses. (First Letter P, Last Letter G)
- 18. This term refers to a software vulnerability that is exploited by hackers before the developers even know about it. (First Letter Z, Last Letter Y)
- 19. This document serves as a comprehensive list detailing identified risks, their potential impacts, and planned responses. (First Letter R, Last Letter R)
- 21. Acts as a barrier against unauthorized access in a network. (First Letter F, Last Letter L)
- 22. Information falling into this classification is sensitive and requires a higher level of protection. Access is typically limited to authorized personnel. (First Letter R, Last Letter D)
- 26. A deceptive practice where cybercriminals use fraudulent emails or websites to trick individuals into revealing sensitive information such as passwords or credit card numbers. (First Letter P, Last Letter G)
- 28. This policy ensures that sensitive information is promptly removed from screens to prevent unauthorized viewing, helping maintain a secure and confidential workspace. (First Letter C, Last Letter N)
- 30. This tactic relies on exploiting human psychology rather than technical vulnerabilities. What's the term for tricking individuals into divulging confidential information or performing actions they normally wouldn't? (First Letter S, Last Letter G)
Down
- 2. This sneaky practice involves someone secretly observing your screen or keyboard to gain unauthorized access to sensitive information. (First Letter S, Last Letter G)
- 3. Often referred to as the first line of defense, this alphanumeric key guards your digital identity. Choosing a strong and unique one is crucial for keeping your accounts secure. What is this critical piece of information? (First Letter P, Last Letter D)
- 5. Name of an antivirus for securing endpoints. (First Letter C, Last Letter E)
- 6. A technique where attackers try various combinations of passwords to gain unauthorized access. (First Letter B, Last Letter E)
- 8. This security principle advocates for providing individuals or systems with only the minimum levels of access or permissions needed to perform their tasks. (First Letter L, Last Letter E)
- 10. this social engineering technique involves sending deceptive text messages to trick individuals into divulging sensitive information. (First Letter S, Last Letter G)
- 11. Overloading a network to make it unavailable. (First Letter D, Last Letter S)
- 12. This deceptive trap lures in potential attackers, helping security professionals study their tactics and protect against real threats. What is this virtual decoy called? (First Letter H, Last Letter T)
- 13. Type of malware disguising as legitimate software. (First Letter T, Last Letter E)
- 17. Your unique physical or behavioral traits are your key to access. Whether it's your fingerprint, face, or even your voice, what authentication method relies on these distinct features? (First Letter B, Last Letter S)
- 20. This essential cybersecurity practice involves updating and fixing vulnerabilities in software to ensure that systems are protected against known threats. (First Letter P, Last Letter G)
- 23. This unauthorized entry technique involves someone closely following an authorized person to gain access to a secure area without proper authentication. (First Letter T, Last Letter G)
- 24. Ensures secure communication over a computer network. (Last Letter N)
- 25. When it comes to securely disposing of sensitive documents, this process involves reducing paper into tiny, unreadable pieces. (First Letter S, Last Letter G)
- 27. This policy encourages a tidy and secure workspace by requiring employees to clear their desks of sensitive or confidential information when they are away. (First Letter C, Last Letter K)
- 29. Method of verifying the integrity and authenticity of a message or software. (First Letter H, Last Letter G)