Across
- 1. a network security system—available as hardware, software, or cloud service—that acts as a barrier between trusted internal networks and untrusted external networks
- 3. a comprehensive strategy combining physical security (guards, surveillance, locks) and IT security (firewalls, encryption, access controls) to protect the infrastructure, servers, and sensitive data within a facility
- 6. a concealed, non-indexed layer of the internet requiring specialized software (e.g., Tor) for access, prioritizing user anonymity
- 11. sending fraudulent emails to CEOs or executives in an attempt to steal information from the target for malicious purposes
- 12. standardized sets of rules, techniques, and procedures designed to protect data integrity, confidentiality, and availability during transmission over networks
- 14. the backbone of the internet, owning global, high-capacity infrastructure (fiber, routers) and refocuses on securing infrastructure with increasing complexity, redundancy, and risk, often following NIST CSF guidelines every other network via settlement-free peering
- 15. any unauthorized, malicious action targeting a computer system, network, or data to compromise its confidentiality, integrity, or availability
- 18. Social engineering is the psychological manipulation of people into performing actions or divulging confidential information, bypassing technical security controls. It exploits human emotions—fear, urgency, curiosity, or trust
Down
- 2. a critical cybersecurity tool designed to detect, block, and remove malicious software (malware)—such as viruses, ransomware, spyware, and worms—from devices and networks
- 4. a powerful, networked computer or software program that manages, stores, and processes data while providing services (e.g., website hosting, file storage, email) to client devices
- 5. the practice of protecting internet-connected systems—including hardware, software, and data—from malicious digital attacks, unauthorized access, or damage
- 7. sending fraudulent emails in an attempt to steal information from the target for malicious purposes
- 8. cybersecurity tool that creates an encrypted, secure "tunnel" over a public network (like the internet) to protect user privacy and data
- 9. the stealthy, initial phase of gathering information about a target system, network, or organization without direct engagement or interaction
- 10. all internet content not indexed by standard search engines (like Google) and is not inherently malicious, often consisting of legitimate, private, password-protected, or encrypted data
- 13. redirecting people from popular websites to fraudulent websites in an attempt to steal information for malicious purposes
- 16. the final, often most challenging, step of securing data as it reaches the end user, device, or application
- 17. The surface web is the publicly accessible, indexed portion of the internet searchable via standard browsers (Google, Bing). Representing only 4–5% of total online content, it includes websites, social media, and news
