Infosec Crossword Puzzle Contest

12345678910111213141516171819
Across
  1. 1. Virtual _________ Network
  2. 5. Malware which presents unwanted advertisements
  3. 7. A Weakness in a system
  4. 10. Application of investigative analysis on a computer
  5. 13. Should not be shared / kept open to anyone
  6. 15. Unplanned disruption or failure of a feature or service
  7. 16. _______ makes password / passphrase more secure
  8. 17. Confidentiality,___________,Availability
  9. 18. Threat X Vulnerability
  10. 19. ________ is created by hackers for unauthorized entry at any point of time..
Down
  1. 2. Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
  2. 3. A terminal emulator / serial console that support SSH
  3. 4. Web __________ Penetration Testing
  4. 6. A Network security device that monitors and filters incoming / outgoing network traffic
  5. 8. ___________ is stimuli that has meaning in some context for its receiver
  6. 9. The refusal of something requested or desired.
  7. 11. The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
  8. 12. Successfully exploiting vulnerability is known as
  9. 13. A fraudulent social engineering attempt to obtain sensitive information
  10. 14. Malicious software that replicates while moving across information systems