Across
- 1. An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
- 4. A method of faking an identity to gain access.
- 7. The process of converting encrypted data back to its original form.
- 8. A code or technique used to take advantage of a vulnerability.
- 9. A security event where unauthorized individuals gain access to a secure computer system, network, or database.
- 10. The process of verifying the identity of a user, device, or system before granting access to resources.
- 11. A type of malware designed to erase its tracks after executing its malicious actions.
- 12. The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
- 2. The name for a number used only once in a cryptographic communication to prevent replay attacks.
- 3. The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
- 5. The act of pretending to be someone else for malicious purposes.
- 6. A form of spear phishing that targets high-profile individuals, like executives.