Across
- 4. CLI command to search for a pattern of letters
- 6. Program used to collect cryptocurrency
- 8. The telephone equivalent of phishing
- 9. Protocol that WannaCry took advantage of
- 12. First step in the cyber kill chain
- 13. A compromised computer in a botnet
- 15. Command to identify Ethernet devices
- 16. Process security analysts use to search for advanced threats
- 17. Resolve hostnames to IP addresses
- 20. The second in the CIA triad
Down
- 1. ... is the process of directing the company approach to security
- 2. ... systems use physical characteristics to determine access
- 3. The process of adding allowed programs to a list is called ...
- 5. Testing technique using invalid or random data as input
- 7. A weakness that can be exploited
- 10. Specifies who gets access to what
- 11. The process of reversing encoded data is ...
- 14. The approach of using multiple layers of security
- 18. Piece of forensic data identifying potential malicious activity
- 19. Uses rules to allow or block traffic