Information Security Crossword Puzzle

1234567891011121314151617181920
Across
  1. 7. Bypassing security on a system
  2. 8. Recovery and Investigation
  3. 11. Which website is used to check your email is compromised or not ?
  4. 13. Weakness in a system
  5. 16. Which attack is also known as “piggybacking” ?
  6. 17. goggle.com is an example of _________ method
  7. 19. Enemy of Security
  8. 20. Client for SSH
Down
  1. 1. Malware which presents unwanted advertisements
  2. 2. Threat X Vulnerability
  3. 3. Technology designed to keep the bad guys out
  4. 4. Everyone should enable Two Factor _____________
  5. 5. Should not be shared / kept open to everyone
  6. 6. Similar to virus that replicate from one to another
  7. 9. ______ is wealth
  8. 10. distributed ______ of service
  9. 12. Confidentiality, __________, Availability
  10. 14. unplanned disruption or degradation of a network
  11. 15. Common type of social engineering attack
  12. 18. Provide real-time analysis of security alerts