Across
- 6. Applying a mathematical algorithm to data to promote integrity.
- 7. Process of accessing and modifying mobile device privileges to bypass OS restrictions.
- 12. A collection of analyzed, publicly available information applicable to security questions (acronym)
- 13. Sharing the risk with another organization, such as an insurance company.
- 15. Any observed, verified, and documented occurrence.
- 17. A periodical outbound connection between a compromised computer and an external controller.
- 18. Anything of value to an organization
- 20. A famous framework used to determine adversarial tactics, techniques, & common knowledge.
- 22. A documented history of how evidence was handled, collected, transported, and preserved.
- 23. Self-replicating malicious code that spreads across vulnerable networks.
- 24. Actions that attempt to deny malicious actors the ability to cause further damage.
- 25. An isolated testing environment where security practitioners can detonate and observe malicious payloads.
Down
- 1. A piece of code written to add functionality or enhanced features, such as to a web browser.
- 2. Type of hold that retains a device in a secure storage area for forensic investigation.
- 3. Protocol that provides secure remote access to network devices.
- 4. Gray hat hacker whose motivations are socially or politically motivated.
- 5. Secondary authentication tool using something you either know, have, or are (acronym).
- 8. Proactively examining one's own infrastructure for potential threats.
- 9. An intermediary device which acts as a gateway between user devices, applications, and the internet.
- 10. Data stored in READ-ONLY memory, which executes when a device is powered on.
- 11. A testing methodology where extreme demands are placed on software to determine robustness.
- 14. The use of security tools & controls to reduce the risk of a vulnerability to acceptable levels.
- 16. A type of "bomb" intentionally inserted into a software system, which detonates under specific conditions.
- 19. An action taken to segment an infected host from communicating with the rest of a network.
- 21. Global standard for protecting stored, processed, and transmitted credit card info.
- 26. List of rules that controls the manner by which network resources may be accessed (acronym).
- 27. Actions and technologies used by organizations to prevent loss of sensitive data (acronym).
