Crossword-InfoSec

1234567891011121314
Across
  1. 2. It's not an insect, but crawls and replicates within a network
  2. 4. A challenge-response test to determine human users
  3. 7. A digital decoy to lure cyber attackers and study their patterns. This helps defend from any large-level attacks.
  4. 9. It records everything that you type.
  5. 11. Malicious activity by internal users. It’s sometimes unintentional also.
  6. 13. A spy software that intends to compromise your personal information
  7. 14. Collection of hijacked systems to carry out a large-scale flood attack
Down
  1. 1. Exploiting the human element to obtain sensitive information
  2. 3. If you are cautious, you will use multi-level authentication
  3. 5. Disguised cyber-criminal pretend to commit malicious acts
  4. 6. A targeted cyber attack to steal critical and classified information of an organization or entity
  5. 8. Process of converting encrypted data into readable form
  6. 10. An intelligently crafted software intended to harm your system
  7. 12. Flooding victims with unwanted requests to restrict the availability of services
  8. 13. An isolated environment to test, research, and analyze without affecting the production environment