Cybersecurity Vocabulary

123456789101112131415
Across
  1. 2. Attack involving the lack of or reduction of a computer resource
  2. 4. Information about a person that can be used to leverage access
  3. 6. Side of CIA Triad that involves Trust
  4. 8. Software installed on a person's computer to record that person's keystrokes and mouse clicks
  5. 10. Social Engineering attack involving scam messages sent via text message
  6. 12. Side of CIA Triad involving redundancy and reliability
  7. 15. Passively gathers information about a potential victim for future use in an attack
Down
  1. 1. Attack performed using phone calls to coerce victims to reveal personal information
  2. 3. Side of CIA Triad that involves Passwords
  3. 5. Social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system
  4. 7. Social Engineering example that involves fake e-mails attempting to steal PII
  5. 9. Attack that takes advantage of people who use short, common words or combinations of these words as their passwords
  6. 11. Eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  7. 13. Where an attacker tries to use every possible combination of letters and numbers until the find a password.
  8. 14. Network attack involving a "botnet" that aims to reduce resources or access