PassoverCyber
Across
- 2. State of a system that has been thoroughly checked
- 5. A model that trusts nothing by default, even inside the network
- 7. System that does "bedikat chametz" and looks for vulnerabilities (a bit like “” for code)
- 8. Bread eaten at Passover
- 9. mechanism that records attempts to access systems and security events
- 11. Security practice of regularly updating software to fix known weaknesses
- 12. The Policy book we read at the Seder
- 13. Type of malware that encrypts files and demands payment
Down
- 1. Holiday commemorating the Exodus
- 3. Process of proving you are who you claim to be
- 4. Type of attack that floods a system with traffic (like locusts)
- 6. Protection that scrambles data so only authorized parties can read it
- 10. Principle that says users should only have the permissions they need
- 11. Common method attackers use to trick users into revealing passwords
- 14. Security layer added after a password (like an extra doorpost protection)