Infosec Crossword Puzzle Contest

1234567891011121314151617181920
Across
  1. 3. Malware which presents unwanted advertisements
  2. 11. ___________ is stimuli that has meaning in some context for its receiver
  3. 12. Virtual _________ Network
  4. 13. Successfully exploiting vulnerability is known as
  5. 14. Microsoft Office is an _______ software
  6. 16. Threat X Vulnerability
  7. 17. Technology designed to keep the bad guys out
  8. 20. A terminal emulator / serial console that support SSH
Down
  1. 1. A Software products which provide real-time analysis of security alerts by network hardware and application
  2. 2. Bypassing system’s customary security mechanism
  3. 4. Unplanned disruption or failure of a feature or service
  4. 5. A Weakness in a system
  5. 6. Confidentiality,___________,Availability
  6. 7. The refusal of something requested or desired.
  7. 8. A fraudulent social engineering attempt to obtain sensitive information
  8. 9. Should not be shared / kept open to anyone
  9. 10. Application of investigative analysis on a computer
  10. 15. _______ makes password / passphrase more secure
  11. 18. Malicious software that replicates while moving across information systems
  12. 19. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication