CYBERSECURITY DECEMBER 2, 2023

123456789101112131415161718192021222324252627
Across
  1. 4. A deceptive practice where a person or program successfully masquerades as another.
  2. 5. A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
  3. 6. Describes data that requires power to maintain its contents.
  4. 8. a fundamental unit of data in computer networking and data communication.
  5. 10. An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
  6. 12. an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
  7. 14. A documented, structured approach for handling security breaches, and cyber threats. (3 words)
  8. 15. A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
  9. 16. _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
  10. 17. A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
  11. 19. A phishing attack transmitted by SMS (text) message.
  12. 21. The world's most famous hacker.
  13. 22. From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
  14. 23. Model that describes how data is transmitted through a network.
  15. 24. a decoy system or resource set up to monitor and analyze the behavior of attackers.
  16. 26. This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
  17. 27. A public-key cryptography algorithm
Down
  1. 1. Relies on human interaction and often involves tricking people into breaking normal security procedures.
  2. 2. This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
  3. 3. An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
  4. 7. In this kind of cipher, both the encryption and decryption process use the same key,
  5. 9. From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
  6. 11. This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
  7. 12. A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
  8. 13. From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
  9. 18. Software tool that allows users to capture and inspect data packets on a computer network.
  10. 20. This software examines requests to access the network and determines if it should pass through.
  11. 25. A number used to identify specific services or processes running on a computer or network device.