Cybersecurity Crossword

12345678910111213141516171819202122232425262728293031323334
Across
  1. 1. The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
  2. 5. Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
  3. 6. A person who uses computers to gain unauthorized access to data.
  4. 8. Any malicious computer program which misleads users of its true intent.
  5. 9. Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
  6. 12. A collection of software tools that enable unauthorized access to a computer or areas of its software.
  7. 13. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. 14. A piece of data that is used in network communications to identify a session.
  9. 15. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  10. 18. A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  11. 20. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  12. 23. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  13. 25. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  14. 28. A type of surveillance technology used to record keystrokes made by a user.
  15. 30. The art of manipulating people so they give up confidential information.
  16. 31. Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  17. 32. Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
  18. 34. A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
  1. 2. Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
  2. 3. Malicious software designed to harm or exploit any programmable device or network.
  3. 4. The study of analyzing information systems in order to study the hidden aspects of the systems.
  4. 7. Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  5. 10. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  6. 11. Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
  7. 13. The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. 16. An algorithm for performing encryption or decryption.
  9. 17. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  10. 19. Exfiltration The unauthorized transfer of data from a computer or server.
  11. 21. Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
  12. 22. Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
  13. 24. Response The methodology an organization uses to respond to and manage a cyberattack.
  14. 26. Operations Center A centralized unit that deals with security issues on an organizational and technical level.
  15. 27. Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  16. 29. Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
  17. 33. The method by which information is converted into secret code that hides the information's true meaning.