Cyber Crossword

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. crime investigation; comes after “digital”
  2. 5. attack stage involving traversal between systems
  3. 6. slang term for “hacked”
  4. 8. attack component that performs the target malicious action
  5. 10. to gain attacker presence on a system
  6. 13. field focusing on protecting computers
  7. 15. attack stage where NMAP may be used
  8. 17. facility whose analysts may use a SIEM
  9. 20. investigation of system and network records
  10. 22. principle of least ___
  11. 23. phrase an attacker says after gaining access
  12. 24. network layer protocol with pings
  13. 25. THE defensive cyber club
  14. 27. fancy term for Google-fu
  15. 28. smartcards using close-proximity communication
  16. 30. fun term for a CDRU member
  17. 31. evidence of malicious activity
  18. 32. evil computer program
Down
  1. 2. short form of “covered writing”
  2. 3. comes before “base” or “science”
  3. 4. a tantalizing trap for attackers
  4. 7. engineering type that works on people
  5. 8. act of sending a malicious email
  6. 9. the shield to red’s sword
  7. 11. authorized cyberattack to identify vulnerabilities
  8. 12. proactive defense, or our theme this semester
  9. 14. bypassing physical security devices without a key
  10. 16. IT person in charge of organization computers
  11. 18. act of smuggling data from a system
  12. 19. common term for offensive security person
  13. 21. short form of “secret writing”
  14. 26. often a network packet filter
  15. 28. collections of connected computers
  16. 29. either 0 or 1