NCSAM 2025 Crossword Event, NRLDC

1234567891011121314151617181920212223242526272829
Across
  1. 3. Isolated environment used to test suspicious files.
  2. 6. Malware that locks files and demands payment for their release.
  3. 7. An extra layer of authentication beyond just a password.
  4. 8. Electronic document used to prove identity online.
  5. 10. A facility where security professionals monitor and respond to threats.
  6. 16. Manipulating people to reveal confidential information.
  7. 20. A security flaw that is exploited before a patch is available.
  8. 25. Attack where a hacker intercepts communication between two parties.
  9. 26. An attack that overwhelms a system with massive traffic.
  10. 27. Malicious software designed to damage or gain unauthorized access to systems.
  11. 28. The process of converting data into a secret code for protection.
  12. 29. Software that records everything typed on a keyboard.
Down
  1. 1. Tool that securely stores and generates complex passwords.
  2. 2. Security risk posed by someone within an organization.
  3. 3. Software that secretly collects information about a user’s activity.
  4. 4. A decoy system set up to lure and study hackers.
  5. 5. A process that converts data into a fixed-length string for security.
  6. 9. A type of malware disguised as legitimate software.
  7. 11. A tool that creates a secure, encrypted connection over the internet.
  8. 12. A self-replicating program that spreads through networks.
  9. 13. A simulated cyberattack to test security defenses.
  10. 14. A network of compromised computers controlled by an attacker.
  11. 15. A system that collects and analyzes security event data in real-time.
  12. 17. A security barrier that controls incoming and outgoing network traffic.
  13. 18. Malware that hides deep in the system to avoid detection.
  14. 19. A hidden method of bypassing normal authentication.
  15. 21. A cyberattack that tricks users into giving away personal information via fake emails or websites.
  16. 22. A software update that fixes security vulnerabilities.
  17. 23. Software that displays unwanted advertisements on a device.
  18. 24. A trial-and-error attack to guess passwords.