CISO Crossword Quiz - 0924

12345678910
Across
  1. 4. Cyber Attackers intercept communication illegally and steal sensitive data in transit
  2. 5. The computer system that is a host to the malware agent of the botnet or to the malware agent itself
  3. 6. A Security incident in which a malicious threat actor gains access to systems without authorization
  4. 7. The process of monitoring and capturing all data packets passing through a given network
  5. 8. The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
  6. 9. A software program designed to take advantage of a flaw in a network, typically for malicious purposes
  7. 10. The action or process of spoiling the appearance of a website in a cyber attack
Down
  1. 1. A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
  2. 2. Related to information security, confidentiality is the opposite to _______
  3. 3. A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network