Taldor's "Go Cyber" competition

123456789101112131415161718192021
Across
  1. 3. An attack that exploits an unknown vulnerability in software.
  2. 5. a software weakness which allows an attacker to gain access to a system.
  3. 7. A small piece of code used as the payload in exploitation.
  4. 8. are you dead yet?
  5. 9. an exploit technique used for malicious code execution
  6. 10. a common hacking technic that relies on a typographical error when typing the website address into the address bar.
  7. 14. A table of legitimate files and processes.
  8. 16. A malware that requests the payment of a fee to unlock encrypted files.
  9. 20. technology that is designed to detect potential data breaches and prevent them.
  10. 21. Security company founded by Kevin Mandia
Down
  1. 1. A common suite for penetration testing and exploitation.
  2. 2. A form of attack using psychological manipulation of people.
  3. 4. a social GPS.
  4. 6. will open the cybertech2014.
  5. 8. Malicious software, designed to hide its processes or programs.
  6. 11. Anonymous’s attack against Ukraine government data
  7. 12. A cyber unit under China’s 2nd Bureau of the PLA.
  8. 13. Company behind February’s largest security conference.
  9. 15. A symmetric-key block cipher.
  10. 17. - A code name made for collecting large amounts of data regarding individuals.
  11. 18. Using something to one’s own advantage
  12. 19. An Attempt to acquire information by masquerading as a trustworthy entity.