Cybersecurity - General

12345678910
Across
  1. 3. Large scale attacks using remotely controlled malware-infected devices
  2. 5. Systems, functions & data being provided on-demand, based on levels of service and defined parameters
  3. 7. Number of stages of Penetration Testing
  4. 9. Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
  5. 10. Only authorized parties permitted to access sensitive information / functions
Down
  1. 1. Process of psychologically manipulating people to divulge personal or critical information
  2. 2. A method of interrupting data traffic between nodes and stealing the required information
  3. 4. Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
  4. 6. Ensuring only authorized users can enter, modify or delete information / functions
  5. 8. An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution