Across
- 7. Bypassing security on a system
- 8. Recovery and Investigation
- 11. Which website is used to check your email is compromised or not ?
- 13. Weakness in a system
- 16. Which attack is also known as “piggybacking” ?
- 17. goggle.com is an example of _________ method
- 19. Enemy of Security
- 20. Client for SSH
Down
- 1. Malware which presents unwanted advertisements
- 2. Threat X Vulnerability
- 3. Technology designed to keep the bad guys out
- 4. Everyone should enable Two Factor _____________
- 5. Should not be shared / kept open to everyone
- 6. Similar to virus that replicate from one to another
- 9. ______ is wealth
- 10. distributed ______ of service
- 12. Confidentiality, __________, Availability
- 14. unplanned disruption or degradation of a network
- 15. Common type of social engineering attack
- 18. Provide real-time analysis of security alerts
