REV Cybersecurity Awareness Trivia Crossword Puzzle

123456789101112131415
Across
  1. 3. stripping one llayer's headers and passing the rest of the packet up to next higher layer
  2. 5. sequence of eight bits
  3. 6. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
  4. 9. approval, permission, or empowerment for someone or something to do something
  5. 11. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
  6. 12. repudiation prove that a user sent a message and the message has not been altered
  7. 13. basic communication language or "protocol" of the Internet
  8. 14. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
  9. 15. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
  1. 1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
  2. 2. gaining unauthorized logical access to sensitive data by circumventing a system's protections
  3. 4. process of confirming the correctness of the claimed identity
  4. 7. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
  5. 8. encrypted form of the message being sent
  6. 10. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one