Infosec Crossword Puzzle Contest
Across
- 3. Should not be shared / kept open to anyone
- 7. Bypassing system’s customary security mechanism
- 8. Unplanned disruption or failure of a feature or service
- 9. Malware which presents unwanted advertisements
- 11. Microsoft Office is an _______ software
- 14. Threat X Vulnerability
- 15. A Weakness in a system
- 17. Virtual _________ Network
- 19. A terminal emulator / serial console that support SSH
- 20. A Software products which provide real-time analysis of security alerts by network hardware and application
Down
- 1. A fraudulent social engineering attempt to obtain sensitive information
- 2. Malicious software that replicates while moving across information systems
- 4. The refusal of something requested or desired.
- 5. Successfully exploiting vulnerability is known as
- 6. Technology designed to keep the bad guys out
- 10. Application of investigative analysis on a computer
- 12. _______ makes password / passphrase more secure
- 13. ___________ is stimuli that has meaning in some context for its receiver
- 16. Confidentiality,___________,Availability
- 18. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication