Advanced Cyber - Cyber Defense

12345678910111213141516
Across
  1. 3. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
  2. 5. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. 6. a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
  4. 7. this is meant to shut down a machine or network, making it inaccessible to its intended users.
  5. 11. An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
  6. 13. an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
  7. 15. a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.
  8. 16. a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Down
  1. 1. a newly established web site that encourages hacking in order to learn and protect against it.
  2. 2. a large-scale cyber attack carried out by malware-infected devices which are controlled remotely.
  3. 4. the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
  4. 8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. 9. the process or action of proving or showing something to be true, genuine, or valid.
  6. 10. a person who uses computers to gain unauthorized access to data.
  7. 12. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  8. 14. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation