Across
- 2. A framework used to manage and mitigate cybersecurity risks.
- 3. A cybersecurity tool used to monitor, detect, and respond to threats.
- 5. - The process of converting data into a code to prevent unauthorized access.
- 6. The practice of finding and fixing security flaws.
- 8. A common online attack method involving fraudulent emails.
- 10. A network security device that monitors and filters incoming and outgoing traffic.
- 11. An open-source intelligence gathering technique.
- 12. A term for ethically hacking a system.
- 16. An organized event where hackers test their skills.
- 17. The art of disguising communication within another medium.
- 19. A type of malware that demands payment for the return of stolen data.
- 21. The practice of attacking a system to test its security.
- 22. A person who finds and reports security vulnerabilities for rewards.
- 23. A malicious program that spreads across systems and networks.
- 24. A type of attack where multiple systems flood a target with traffic.
Down
- 1. The exploitation of software vulnerabilities by malicious hackers.
- 4. The unauthorized access of data in transit.
- 6. A cryptographic key used in public key cryptography.
- 7. A protocol used for secure internet communication.
- 9. The process of analyzing network traffic for malicious activity.
- 13. An organization that sets standards for securing information systems.
- 14. A type of attack that overwhelms a system with traffic.
- 15. A hidden malicious software that provides backdoor access.
- 17. A form of social engineering to manipulate users into giving up confidential information.
- 18. A global, decentralized group known for hacktivism.
- 20. A popular TV series about a hacker with dissociative identity disorder.