Threat Intelligence (Medium)
Across
- 4. A type of cyberattack that uses deception to trick individuals into revealing sensitive information.
- 6. A software vulnerability that is known and can be exploited by attackers.
- 9. The process of analyzing and evaluating threats to identify potential risks and vulnerabilities.
- 10. A malicious software that disguises itself as legitimate software to gain unauthorized access or cause harm.
- 11. The process of gathering and analyzing information to identify and mitigate potential threats.
Down
- 1. An individual or group that conducts unauthorized activities to gain access to computer systems.
- 2. A technique used to deceive individuals or systems by pretending to be a trusted entity.
- 3. The process of identifying, categorizing, and prioritizing potential threats or vulnerabilities.
- 5. A set of predefined rules or criteria used to identify potential threats or suspicious activities.
- 7. An attack in which multiple compromised devices are used to flood a network or website with traffic.
- 8. A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents.