CyberFun

12345678910111213
Across
  1. 2. An attack that prevents or impairs the authorized use of information system resources or services.
  2. 4. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
  3. 7. The process of transforming plaintext into ciphertext.
  4. 8. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
  5. 9. The property of being accessible and usable upon demand.
  6. 11. A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.
  7. 12. A collection of computers compromised by malicious code and controlled across a network.
  8. 13. The process of verifying the identity or other attributes of an entity (user, process, or device).
Down
  1. 1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. 3. A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group
  3. 5. A technique to breach the security of a network or information system in violation of security policy.
  4. 6. An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
  5. 10. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
  6. 11. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.