Across
- 1. crime investigation; comes after “digital”
- 5. attack stage involving traversal between systems
- 6. slang term for “hacked”
- 8. attack component that performs the target malicious action
- 10. to gain attacker presence on a system
- 13. field focusing on protecting computers
- 15. attack stage where NMAP may be used
- 17. facility whose analysts may use a SIEM
- 20. investigation of system and network records
- 22. principle of least ___
- 23. phrase an attacker says after gaining access
- 24. network layer protocol with pings
- 25. THE defensive cyber club
- 27. fancy term for Google-fu
- 28. smartcards using close-proximity communication
- 30. fun term for a CDRU member
- 31. evidence of malicious activity
- 32. evil computer program
Down
- 2. short form of “covered writing”
- 3. comes before “base” or “science”
- 4. a tantalizing trap for attackers
- 7. engineering type that works on people
- 8. act of sending a malicious email
- 9. the shield to red’s sword
- 11. authorized cyberattack to identify vulnerabilities
- 12. proactive defense, or our theme this semester
- 14. bypassing physical security devices without a key
- 16. IT person in charge of organization computers
- 18. act of smuggling data from a system
- 19. common term for offensive security person
- 21. short form of “secret writing”
- 26. often a network packet filter
- 28. collections of connected computers
- 29. either 0 or 1
