Hack Your Brain

123456789101112
Across
  1. 2. A specific type of phishing that targets high-profile individuals, such as executives.
  2. 5. A technology used to create a secure, encrypted tunnel between two networks.
  3. 6. A malicious attempt to disrupt a network by overwhelming it with traffic.
  4. 8. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
  5. 9. A technique where attackers attempt to guess passwords by trying all possible combinations.
  6. 12. The unauthorized exploitation of a network to access confidential data or systems.
Down
  1. 1. An individual who uses hacking skills for ethical purposes.
  2. 3. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
  3. 4. A cybersecurity practice where teams work against each other, with attackers and defenders.
  4. 7. ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
  5. 10. A widely used asymmetric encryption algorithm named after its inventors.
  6. 11. ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.