InfoSec Awareness Crossword Puzzle

123456789101112131415
Across
  1. 2. Protocol that is meant for uploading and downloading files.
  2. 6. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
  3. 9. A computer program that keeps a log of your keystrokes on your keyboard.
  4. 11. The process by which two information systems establish a communication channel.
  5. 12. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  6. 14. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  7. 15. A bundle of programs that is designed to bombard users with advertisements.
Down
  1. 1. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  2. 3. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  3. 4. a cyber attack intended to redirect a website's traffic to another, fake site.
  4. 5. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  5. 7. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  6. 8. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  7. 10. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  8. 13. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.