Across
- 3. The collection and analysis of data gathered from open sources to produce actionable intelligence.
- 5. Hardware or software designed to prevent unauthorized access to or from a private network.
- 6. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
- 10. Social engineering where an attacker sends a fraudulent message designed to trick an end user.
- 12. A method that uses trial and error to crack passwords, login credentials, and encryption keys.
- 13. Technology that extends a private network across a public network
Down
- 1. Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
- 2. The process of giving someone permission to do or have something.
- 4. Facebook, twitter, instagram, etc. (two words)
- 7. A computer program used to prevent, detect, and remove malware.
- 8. A regulation in EU law on data protection and privacy.
- 9. Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
- 11. Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.
