CWO Crossword

1234567891011121314151617181920212223242526
Across
  1. 1. Management The process of identifying, assessing, and prioritizing security risks
  2. 4. A self-replicating malware that spreads through a network
  3. 5. Malware that locks a user’s data until a ransom is paid
  4. 11. Detection A system that monitors network traffic for suspicious activity
  5. 12. A type of malware disguised as legitimate software
  6. 15. A network of infected computers controlled remotely by an attacker
  7. 16. Team The group responsible for defending an organization against attacks
  8. 19. A hidden method of bypassing security to gain access to a system
  9. 22. Software designed to damage or disrupt a computer system
  10. 23. of Service An attack that makes a service unavailable by overwhelming it with traffic
  11. 24. Threat A security risk that comes from within the organization
  12. 26. The process of verifying the identity of a user or system
Down
  1. 2. Software that secretly monitors user activity and collects information
  2. 3. A type of attack where fraudulent emails are sent to steal personal information
  3. 6. Software designed to detect and remove malicious software
  4. 7. Authentication A security system requiring more than one method of authentication
  5. 8. A network security system that monitors and controls incoming and outgoing traffic
  6. 9. Engineering Manipulating individuals into divulging confidential information
  7. 10. An isolated testing environment used to run and analyze untrusted programs
  8. 13. A software update that fixes security vulnerabilities
  9. 14. Malware that records keystrokes to steal information
  10. 17. The process of converting data into a secure code to prevent unauthorized access
  11. 18. Control A method of ensuring that only authorized users can access resources
  12. 20. Team A group that simulates attacks to test the security of systems
  13. 21. Software or hardware designed to block unauthorized access to a network
  14. 25. An attack where multiple systems flood the bandwidth of a targeted system