Cyber Security Crossword

12345678910111213
Across
  1. 3. The collection and analysis of data gathered from open sources to produce actionable intelligence.
  2. 5. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. 6. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
  4. 10. Social engineering where an attacker sends a fraudulent message designed to trick an end user.
  5. 12. A method that uses trial and error to crack passwords, login credentials, and encryption keys.
  6. 13. Technology that extends a private network across a public network
Down
  1. 1. Common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
  2. 2. The process of giving someone permission to do or have something.
  3. 4. Facebook, twitter, instagram, etc. (two words)
  4. 7. A computer program used to prevent, detect, and remove malware.
  5. 8. A regulation in EU law on data protection and privacy.
  6. 9. Offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
  7. 11. Malware that misleads users of its true intent. The term is derived from an Ancient Greek story.