Across
- 1. A small device or software used to create a secure encrypted tunnel between two networks
- 5. The unauthorized exploitation of a network to access confidential data or systems
- 7. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
- 8. The process of identifying and analyzing security risks
- 9. A specific type of phishing that targets high-profile individuals, such as executives
- 11. A malicious attempt to disrupt a network by overwhelming it with traffic
- 12. An individual who uses hacking skills for ethical purposes
Down
- 2. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
- 3. Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
- 4. A technique where attackers attempt to guess passwords by trying all possible combinations
- 6. Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
- 10. A widely-used asymmetric encryption algorithm named after its inventors