Cyber Intelligence (Medium)

1234567891011
Across
  1. 2. The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
  2. 4. An individual or group that carries out cyber attacks for political or ideological reasons.
  3. 6. A technique used to gather intelligence by infiltrating target networks or systems.
  4. 7. A technique used to gather intelligence by monitoring and analyzing public sources of information.
  5. 9. A covert technique used to gain unauthorized access to a computer system.
  6. 10. A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
  7. 11. The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
  1. 1. The process of identifying and mapping potential vulnerabilities in a system or network.
  2. 3. a centralized team responsible for monitoring and responding to security incidents.
  3. 5. A software program that disguises itself as a legitimate program but performs malicious activities.
  4. 8. The proactive search for indicators of compromise and potential threats within a network or system.