InfoSec Awareness Crossword Puzzle

123456789101112131415161718
Across
  1. 3. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  2. 5. Protocol that is meant for uploading and downloading files.
  3. 8. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  4. 11. The process by which two information systems establish a communication channel.
  5. 13. A bundle of programs that is designed to bombard users with advertisements.
  6. 14. A firewall setting that separates LAN of an organization from the external network.
  7. 16. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  8. 17. A computer program that keeps a log of your keystrokes on your keyboard.
  9. 18. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
  1. 1. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  2. 2. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
  3. 4. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  4. 6. a cyber attack intended to redirect a website's traffic to another, fake site.
  5. 7. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  6. 9. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  7. 10. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  8. 12. A bridge between two networks that connects using different protocols.
  9. 15. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.