Across
- 1. A group of experts dedicated to responding to computer security incidents.
- 3. The practice of protecting computer systems and networks from digital attacks.
- 5. The process of converting data into an unreadable format to protect it from unauthorized access.
- 7. Acronym for the process of collecting and analyzing publicly available information to gain insights.
- 11. The unauthorized access to computer systems or networks.
- 15. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- 17. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- 19. A security system that monitors and controls network traffic.
- 20. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- 22. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- 23. Malicious software designed to harm computer systems or networks.
- 24. A network of compromised computers controlled by an attacker.
Down
- 2. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- 4. Malware that encrypts a victim's data and demands a ransom for its decryption.
- 6. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- 8. The likelihood of a threat exploiting a vulnerability and causing harm.
- 9. A weakness in a system or network that can be exploited by attackers.
- 10. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- 12. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- 13. Web A part of the internet that is not indexed by search engines and requires special software to access.
- 14. A group of information security experts who respond to malware attacks or other computer security incidents.
- 16. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- 18. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- 21. Illegal activities committed using computer networks or devices.