Cyber Security Operations

123456789101112131415161718192021
Across
  1. 1. Software used to monitor network or system activities for malicious policy violations.
  2. 5. A sophisticated, long-term campaign by an attacker to remain undetected while stealing data.
  3. 9. UK Act that criminalizes unauthorized access to computer material (1990). | **COMPUTER MISUSE ACT
  4. 11. An attacker who hacks for ideological, political, or social causes rather than financial gain.
  5. 12. Malware that requires a host file or human action to spread and replicate.,
  6. 14. A network security device that monitors and filters incoming/outgoing traffic based on rules.
  7. 15. The chronological documentation of evidence handling.
  8. 18. The pillar of the CIA triad that ensures data has not been altered or tampered with.
  9. 19. An attack (XSS) where malicious scripts are injected into trusted websites for users to execute.
  10. 21. A "decoy" system designed to lure and study attackers.
Down
  1. 2. An unskilled individual who uses existing automated tools or code to launch cyber attacks.
  2. 3. An attack that inserts malicious code into a database query to steal or delete data.
  3. 4. The phase where forensic tools are used to find hidden or deleted files.
  4. 6. ENGINEERING The practice of manipulating people into divulging confidential info.
  5. 7. A mathematical algorithm used to verify the integrity of an image.
  6. 8. An ethical security professional who hacks systems to find and fix vulnerabilities.
  7. 10. A hacker who falls between ethical and malicious; they may break laws but often without bad intent.
  8. 13. The practice of partitioning a network into smaller, isolated zones to contain breaches.
  9. 16. DAY A vulnerability that is unknown to the vendor and has no patch.
  10. 17. IN DEPTH A defence strategy using multiple layers of security.
  11. 20. Self-replicating malware that spreads across networks without needing a host file.