The hardest crossword puzzle EVERRR
Across
- 2. Someone fraudulently trying to gain access to an unauthorized system.
- 4. Any security practice put in place to mitigate a security event or incident from occurring.
- 5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
- 9. Most useful tool in cybersecurity, pretty much.
- 11. The practice of utilizing trial and error to guess credentials.
- 12. Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
- 13. Copies of data
- 14. A condiment
- 15. describes a minor disruption to the digital landscape that is thought to be unintentional
Down
- 1. A data file through which the identity, authenticity and reliability of a website or web application is established.
- 3. Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
- 6. A possibility of being attacked or harmed
- 7. responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- 8. A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
- 10. A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.