Cyber Security Terms

1234567891011121314151617181920212223242526272829303132
Across
  1. 5. Security device/software controlling inbound/outbound network traffic.
  2. 6. Any malicious software (virus worm Trojan etc.).
  3. 7. Distributed Denial of Service Attack that overwhelms a target with traffic from multiple sources.
  4. 11. Malware that encrypts files and demands payment.
  5. 12. Challenge-response test to distinguish humans from bots.
  6. 14. Social engineering attack tricking users into revealing sensitive info.
  7. 16. Malware designed to hide presence and maintain privileged access.
  8. 19. Advanced Encryption Standard A widely used symmetric encryption algorithm for securing data.
  9. 20. Common Vulnerabilities and Exposures Database of known security vulnerabilities.
  10. 22. Virtual Private Network Encrypts internet traffic to secure communications.
  11. 23. Internet of Things Connected smart devices that often lack strong security.
  12. 25. Bring Your Own Device Policy allowing employees to use personal devices at work raising security challenges.
  13. 26. Force Attack Method of guessing passwords or keys by trying all possibilities.
  14. 27. Security model: Confidentiality Integrity Availability.
  15. 30. Public Key Infrastructure Framework for managing digital certificates and encryption.
  16. 31. Multi-Factor Authentication Using more than one method to verify identity.
  17. 32. Man-in-the-Middle Attack where an adversary intercepts communications between two parties.
Down
  1. 1. Overflow Exploit where extra data overflows into unintended memory space.
  2. 2. Security Information and Event Management System collecting and analyzing security logs.
  3. 3. Remote Access Trojan Malware allowing attackers to control systems remotely.
  4. 4. Protecting cloud-based assets and services.
  5. 7. Domain Name System Translates domain names into IP addresses.
  6. 8. One-way transformation of data into fixed-length values (used for password storage).
  7. 9. Address Resolution Protocol Protocol that maps IP addresses to MAC addresses; often abused in ARP spoofing attacks.
  8. 10. Advanced Persistent Threat A prolonged targeted cyberattack where an intruder remains undetected for an extended time.
  9. 13. Network of compromised devices controlled remotely for attacks.
  10. 15. Decoy system designed to lure and study attackers.
  11. 17. Malware that records keystrokes to steal credentials.
  12. 18. Access Control List Rules that define which users or systems can access specific resources.
  13. 21. Encoding data to make it unreadable without a key.
  14. 23. Intrusion Detection System Monitors traffic for suspicious activity.
  15. 24. Penetration Testing Authorized simulated attack to identify weaknesses.
  16. 28. Intrusion Prevention System Detects and blocks attacks in real-time.
  17. 29. Demilitarized Zone Network segment exposed to the internet but isolated from internal systems.
  18. 30. Management Process of updating software to fix vulnerabilities.