Cryptober Crossword Puzzle #3

123456789101112131415
Across
  1. 2. The principle of allowing users or applications the least amount of permissions necessary to perform their intended function
  2. 4. A piece of code that is deliberately inserted into a system to trigger a malicious program
  3. 6. One of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention
  4. 9. Disabling network access to specific computers to prevent the spread of malware to the rest of the organization
  5. 12. The user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system
  6. 13. A network of computers infected malicious software and controlled as a group without the owners knowledge. Usually controlled for malicious intent
  7. 14. An alert that incorrectly indicates that malicious activity is occurring.
Down
  1. 1. The method or pathway in which attackers use to gain access to a system
  2. 3. A authentication method which takes into account the unique physical qualities of a person
  3. 5. A disaster recovery site with standard equipment installed. An organization can usually be operational again in a couple days in case of a disaster. Computers and servers are not usually installed here
  4. 7. Process to remove information from media such that information recovery is not possible
  5. 8. A technique used to gain information about a computer system on a network and the services running on its open ports
  6. 10. Searching for Wi-Fi networks from a moving vehicle
  7. 11. When two or more computers or network devices try to transmit data to the same device at the same time.
  8. 15. An attack that takes advantage of a software vulnerability or security flaw