Infosec Crossword Puzzle Contest

1234567891011121314151617181920
Across
  1. 3. Should not be shared / kept open to anyone
  2. 7. Bypassing system’s customary security mechanism
  3. 8. Unplanned disruption or failure of a feature or service
  4. 9. Malware which presents unwanted advertisements
  5. 11. Microsoft Office is an _______ software
  6. 14. Threat X Vulnerability
  7. 15. A Weakness in a system
  8. 17. Virtual _________ Network
  9. 19. A terminal emulator / serial console that support SSH
  10. 20. A Software products which provide real-time analysis of security alerts by network hardware and application
Down
  1. 1. A fraudulent social engineering attempt to obtain sensitive information
  2. 2. Malicious software that replicates while moving across information systems
  3. 4. The refusal of something requested or desired.
  4. 5. Successfully exploiting vulnerability is known as
  5. 6. Technology designed to keep the bad guys out
  6. 10. Application of investigative analysis on a computer
  7. 12. _______ makes password / passphrase more secure
  8. 13. ___________ is stimuli that has meaning in some context for its receiver
  9. 16. Confidentiality,___________,Availability
  10. 18. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication