CS

123456789101112131415161718192021222324
Across
  1. 7. The act of secretly listening to or monitoring communication between two parties, often to steal sensitive data. (13)
  2. 8. A decoy system or server designed to lure cybercriminals and detect malicious activities. (7)
  3. 9. A security technique that isolates applications or processes in a controlled environment to prevent them from affecting the rest of the system. (10)
  4. 10. An open standard for secure, passwordless authentication which is also available for authenticating into EKAMEV from smartphones. (4)
  5. 14. A hidden entry point into a system, often used by attackers. (8)
  6. 15. A policy that allows employees to use personal devices (like smartphones/ laptop) for work, potentially introducing security risks. (4)
  7. 16. A software update designed to fix vulnerabilities. (5)
  8. 17. _____________ Detection System is employed for monitoring network traffic for security breaches. (9)
  9. 18. – The I of the CIA triad of cybersecurity. (9)
  10. 19. A type of social engineering attack where voice communication (usually over the phone) is used to trick individuals into revealing personal information. (7)
  11. 21. A physical security measure involving a small, secure space where individuals are authenticated before entering a facility. (6)
  12. 22. A zone in the network segment that acts as a buffer between an internal network and external networks, often used to host public-facing services (13)
  13. 23. The ChatGPT equivalent application of the office (6)
  14. 24. A testing technique used to identify vulnerabilities in software by inputting random, unexpected, or malformed data. (4)
Down
  1. 1. The individual who controls and directs a botnet to perform malicious activities. (9)
  2. 2. A type of phishing attack that targets high-level executives to steal sensitive information. (7)
  3. 3. A wireless communication protocol often used in IoT devices that can be susceptible to security vulnerabilities. (6)
  4. 4. Malware that records keystrokes on a device to steal sensitive information such as passwords.(9)
  5. 5. A vulnerability that is exploited by attackers before the software developer can patch it. (4-3)
  6. 6. The process of substituting sensitive data with a unique identifier or token that retains its meaning but is useless if breached. (12)
  7. 11. Unauthorized use of a system's resources to mine cryptocurrency. (13)
  8. 12. The certifying authority that issues digital certificates for accessing CBS in the office (5)
  9. 13. Redirecting a website’s traffic to a fake version of the site to steal information. (8)
  10. 20. Malicious software designed to conceal its presence on a compromised system and provide privileged access. (7)
  11. 22. The process of using a magnetic field to destroy data stored on magnetic media like hard drives or tapes. (10)