Across
- 5. Pop-up malware intent on using fear tactics to get you to perform an action.
- 6. Data must be accessible when you need them. Part of the CIA triad.
- 10. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
- 11. A flaw in a system that can enable an adversary to compromise the security of that system.
- 12. A type of threat that includes authorized system users and disgruntled employees.
- 16. "Good guy" hackers.
- 18. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
- 21. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
- 22. Multiple compromised systems under the control of a single attacker.
- 24. A device that permits the flow of authorized data, while keeping unauthorized data out.
- 25. A vulnerability or exploit that is unknown to software developers and security professionals.
- 26. A team that acts as the adversary during a security assessment.
- 27. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
- 28. The broad term for nontraditional, internet-connected smart devices.
- 29. A network of devices created for the sole purpose of luring in an attacker.
- 30. A protocol used to ensure time synchronization between devices.
Down
- 1. The act of moving around, looking for vulnerable Wi-Fi networks.
- 2. Hardware and/or software used to capture and record key strokes.
- 3. Spear phishing aimed at high-profile targets such as executives.
- 4. Cryptography that uses two different keys for encryption and decryption.
- 7. Information that can be used to distinguish an individual’s identity.
- 8. The act of applying a fix to a software defect.
- 9. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
- 13. Cryptography that uses the same shared secret key for both encryption and decryption.
- 14. An attack from multiple compromised systems that target a single system, service, or application.
- 15. Malware intent on holding your data hostage in an attempt to extort money.
- 17. Protecting of information from unauthorized access. Part of the CIA triad.
- 19. A team usually involved with the defense of the organization’s infrastructure.
- 20. An old method programmers use to bypass security to gain access to a system or software. "War Games"
- 22. "Bad guy" hackers.
- 23. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.