InfoSec Awareness Crossword Puzzle

123456789101112131415
Across
  1. 2. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
  2. 5. A bridge between two networks that connects using different protocols.
  3. 7. A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
  4. 8. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  5. 10. A firewall setting that separates LAN of an organization from the external network.
  6. 12. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  7. 13. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  8. 14. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  9. 15. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
  1. 1. Protocol that is meant for uploading and downloading files.
  2. 3. A bundle of programs that is designed to bombard users with advertisements.
  3. 4. A computer program that keeps a log of your keystrokes on your keyboard.
  4. 6. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  5. 7. A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
  6. 9. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. 11. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.