Cyber Security Awareness Month

123456789101112
Across
  1. 3. An initial phase of a cyber-attack which entails gathering information about a target system, network, or organization to pinpoint vulnerabilities that can be exploited in subsequent stages.
  2. 6. Targeted attacks aimed at specific individuals or organizations, often personalized.
  3. 7. A common threat to individuals involves the theft of personal information such as Social Security numbers and credit card details, which is used without consent for financial gain or fraud.
  4. 10. A part of the internet often associated with illegal activities which is not indexed by traditional search engines and requires specific software or configurations to access.
  5. 11. A form of spear phishing that targets high-profile individuals, like executives.
  6. 12. Process of verifying the identity of a user, device, or system before granting access to resources.
Down
  1. 1. A hacker who may violate ethical standards or laws but does not have malicious intent.
  2. 2. A number used only once in a cryptographic communication to prevent replay attacks.
  3. 4. The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis
  4. 5. A type of malware designed to erase its tracks after executing its malicious actions.
  5. 8. A fraudulent email correspondence that appear to come from trustworthy sources.
  6. 9. A security event where unauthorized individuals gain access to a computer system, network, or database, potentially leading to the exposure, theft, or alteration of sensitive information.