Across
- 5. Security device/software controlling inbound/outbound network traffic.
- 6. Any malicious software (virus worm Trojan etc.).
- 7. Distributed Denial of Service Attack that overwhelms a target with traffic from multiple sources.
- 11. Malware that encrypts files and demands payment.
- 12. Challenge-response test to distinguish humans from bots.
- 14. Social engineering attack tricking users into revealing sensitive info.
- 16. Malware designed to hide presence and maintain privileged access.
- 19. Advanced Encryption Standard A widely used symmetric encryption algorithm for securing data.
- 20. Common Vulnerabilities and Exposures Database of known security vulnerabilities.
- 22. Virtual Private Network Encrypts internet traffic to secure communications.
- 23. Internet of Things Connected smart devices that often lack strong security.
- 25. Bring Your Own Device Policy allowing employees to use personal devices at work raising security challenges.
- 26. Force Attack Method of guessing passwords or keys by trying all possibilities.
- 27. Security model: Confidentiality Integrity Availability.
- 30. Public Key Infrastructure Framework for managing digital certificates and encryption.
- 31. Multi-Factor Authentication Using more than one method to verify identity.
- 32. Man-in-the-Middle Attack where an adversary intercepts communications between two parties.
Down
- 1. Overflow Exploit where extra data overflows into unintended memory space.
- 2. Security Information and Event Management System collecting and analyzing security logs.
- 3. Remote Access Trojan Malware allowing attackers to control systems remotely.
- 4. Protecting cloud-based assets and services.
- 7. Domain Name System Translates domain names into IP addresses.
- 8. One-way transformation of data into fixed-length values (used for password storage).
- 9. Address Resolution Protocol Protocol that maps IP addresses to MAC addresses; often abused in ARP spoofing attacks.
- 10. Advanced Persistent Threat A prolonged targeted cyberattack where an intruder remains undetected for an extended time.
- 13. Network of compromised devices controlled remotely for attacks.
- 15. Decoy system designed to lure and study attackers.
- 17. Malware that records keystrokes to steal credentials.
- 18. Access Control List Rules that define which users or systems can access specific resources.
- 21. Encoding data to make it unreadable without a key.
- 23. Intrusion Detection System Monitors traffic for suspicious activity.
- 24. Penetration Testing Authorized simulated attack to identify weaknesses.
- 28. Intrusion Prevention System Detects and blocks attacks in real-time.
- 29. Demilitarized Zone Network segment exposed to the internet but isolated from internal systems.
- 30. Management Process of updating software to fix vulnerabilities.
