InfoSec Awareness Crossword Puzzle

123456789101112131415161718
Across
  1. 4. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  2. 6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  3. 8. a cyber attack intended to redirect a website's traffic to another, fake site.
  4. 11. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  5. 12. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  6. 15. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  7. 16. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
  8. 17. A bundle of programs that is designed to bombard users with advertisements.
Down
  1. 1. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  2. 2. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  3. 3. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  4. 5. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  5. 7. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
  6. 9. The process by which two information systems establish a communication channel.
  7. 10. A computer program that keeps a log of your keystrokes on your keyboard.
  8. 13. Protocol that is meant for uploading and downloading files.
  9. 14. A bridge between two networks that connects using different protocols.
  10. 18. A firewall setting that separates LAN of an organization from the external network.