Final Crossword Security Plus

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 2. inserts statements to manipulate a database server
  2. 3. hiding data within an ordinary, nonsecret file
  3. 8. Removing user accounts
  4. 13. ensuring that an organization adheres to laws and regulations
  5. 16. It only goes off after certain conditions are met
  6. 21. Subset of the board that manages governance issues
  7. 24. bruteforce collision attack that exploits the probability theory
  8. 25. Threat actors who are strongly motivated by philosophical or political beliefs.
  9. 26. involves isolating sensitive enterprise data
  10. 29. pose a threat from the position of a trusted entity
  11. 30. refers to integrating security into the application
  12. 32. A device that distributes work across a network
  13. 33. An attack that copies data and then uses it
  14. 35. The entity that is responsible for digital certificates
  15. 36. Individual or entity who is responsible for attacks
  16. 37. is a finite sequence of rigorous instructions
  17. 38. Data that is encapsulated within a secure outer shell
  18. 39. Threat actors who are employed by their own government to carry out attacks
Down
  1. 1. Vulnerability for which there are no days of advanced warning
  2. 4. The rapid detection and elevation of a threat incident
  3. 5. A downgrade attack
  4. 6. server within the DMZ that is used to connect two dissimilar security zones
  5. 7. features and characteristics of the individual
  6. 9. two or more different messages that produce the same hash value
  7. 10. Standard preconfigured passwords
  8. 11. decentralized, distributed and public digital ledger
  9. 12. An AP set up by an attacker to mimic an authorized AP
  10. 14. A malicious program that uses a computer network to replicate
  11. 15. Closing unused ports and disabling unnecessary protocols
  12. 17. resource that is not possible due to geography
  13. 18. An unauthorized AP that allows an attacker to bypass many of the network security
  14. 19. denial of the truth or validity of something
  15. 20. validate a main domain along with all subdomains
  16. 22. evidence or proof of something
  17. 23. A product that consolidates real-time security monitoring and management
  18. 27. performs a real-time lookup of a certificate’s status
  19. 28. unauthorized copying of data
  20. 29. object whose state cannot be modified after it is created
  21. 31. Identifying and mitigating risks brought on by a third party
  22. 34. retains historical documents