Newsletter

12345678910111213141516171819202122232425262728
Across
  1. 3. What term describes an ethical hacker who uses their skills to improve cybersecurity
  2. 4. what acts as a barrier between a trusted internal network and an untrusted external network.
  3. 5. What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
  4. 6. What term in cybersecurity is responsible for defending against simulated or real attacks.
  5. 8. What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
  6. 10. What technology stores recently accessed data to speed up future acess
  7. 12. What type of malware will self-replication and spread independently across networks.
  8. 13. What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
  9. 16. What term refers to the physical components of a computer system.
  10. 18. What term refers to a group of interconnected computers or other devices that can communicate with each other.
  11. 21. What term refers to testing a computer system, network, or web application to find security vulnerabilities?
  12. 22. What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
  13. 24. what term refers to a collection of data or computer instructions that tell a computer how to work.
  14. 25. What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
  15. 27. What group within an organization is responsible for simulating attacks against their own organization to test security measures.
  16. 28. What term refers to a fixed-size output of a hash function that represents input data?
Down
  1. 1. What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
  2. 2. What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
  3. 6. What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
  4. 7. What term refers to when someone is trying to disguise themselves as being a trusted known source.
  5. 9. What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
  6. 11. What type of software attaches itself to a legitimate program and spreads once the program is run.
  7. 14. What term describes unauthorized use of someone else's computer to mine cryptocurrency?
  8. 15. What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
  9. 17. What type of malware encrypts a victim’s files and demands payment for the decryption key?
  10. 19. What field of study involves techniques for secure communication in the presence of third parties?
  11. 20. What protocol translates domain names into IP addresses?
  12. 23. What term refers to a record of events that happen within an operating system, application or network device.
  13. 26. What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.