GSO Puzzle

12345678910111213141516171819
Across
  1. 5. The integration of security practices into the software development lifecycle, aiming for 'security by design'.
  2. 6. The process of verifying the identity of a user, system, or application.
  3. 7. A network security system that filters incoming and outgoing network traffic.
  4. 9. The phase of incident response focused on analysis of the event and lessons learned for future improvement.
  5. 11. Unsolicited commercial email, a common nuisance and potential vector for attacks.
  6. 12. Adherence to established laws, regulations, and industry standards.
  7. 14. A type of malware that encrypts data and demands payment for its release.
  8. 17. The process of scrambling data to prevent unauthorized access.
  9. 19. A weakness or flaw in a system that can be exploited by an attacker.
Down
  1. 1. A type of malware that self-replicates and spreads to other computers by attaching to legitimate programs.
  2. 2. Software Development Life Cycle, where security should be integrated at every stage.
  3. 3. A security architecture where no user, device, or application is trusted by default.
  4. 4. A simulated cyberattack against a computer system to identify vulnerabilities.
  5. 8. The process of applying updates to software to fix bugs or security vulnerabilities.
  6. 10. Malicious software designed to disrupt or damage computer systems.
  7. 13. A type of social engineering attack often via email, aiming to trick users.
  8. 15. Requiring more than one method of verification for user access.
  9. 16. A sophisticated, prolonged cyberattack campaign often sponsored by nation-states.
  10. 18. A type of malware that provides hidden access and privileges on a system, often at the kernel level.