Cybersecurity Fundamental Chapter 7

12345678910111213141516
Across
  1. 5. A model used in cybersecurity to describe the stages of an information systems attack.
  2. 7. Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
  3. 8. The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
  4. 10. The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
  5. 12. A technology used for tracking and identifying objects using radio waves.
  6. 13. The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
  7. 14. The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
  8. 16. The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
  1. 1. The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
  2. 2. The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
  3. 3. Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
  4. 4. Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
  5. 6. The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
  6. 9. The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
  7. 11. Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
  8. 15. Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.