DC9111

123456789101112131415161718192021222324
Across
  1. 2. A framework used to manage and mitigate cybersecurity risks.
  2. 3. A cybersecurity tool used to monitor, detect, and respond to threats.
  3. 5. - The process of converting data into a code to prevent unauthorized access.
  4. 6. The practice of finding and fixing security flaws.
  5. 8. A common online attack method involving fraudulent emails.
  6. 10. A network security device that monitors and filters incoming and outgoing traffic.
  7. 11. An open-source intelligence gathering technique.
  8. 12. A term for ethically hacking a system.
  9. 16. An organized event where hackers test their skills.
  10. 17. The art of disguising communication within another medium.
  11. 19. A type of malware that demands payment for the return of stolen data.
  12. 21. The practice of attacking a system to test its security.
  13. 22. A person who finds and reports security vulnerabilities for rewards.
  14. 23. A malicious program that spreads across systems and networks.
  15. 24. A type of attack where multiple systems flood a target with traffic.
Down
  1. 1. The exploitation of software vulnerabilities by malicious hackers.
  2. 4. The unauthorized access of data in transit.
  3. 6. A cryptographic key used in public key cryptography.
  4. 7. A protocol used for secure internet communication.
  5. 9. The process of analyzing network traffic for malicious activity.
  6. 13. An organization that sets standards for securing information systems.
  7. 14. A type of attack that overwhelms a system with traffic.
  8. 15. A hidden malicious software that provides backdoor access.
  9. 17. A form of social engineering to manipulate users into giving up confidential information.
  10. 18. A global, decentralized group known for hacktivism.
  11. 20. A popular TV series about a hacker with dissociative identity disorder.