Across
- 2. MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
- 4. A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
- 7. A ROUTINE FIX FOR A COMPUTER PROGRAM.
- 9. THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
- 10. FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
- 11. A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
- 13. YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
- 16. THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
- 17. A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
- 21. THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
- 22. THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
- 24. I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
- 25. A SELF-REPLICATING MALICIOUS PROGRAM.
- 26. AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
- 29. A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
- 30. ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
- 32. I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
- 1. THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
- 3. UNAUTHORIZED USER WITH MALICIOUS INTENT.
- 5. WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
- 6. THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
- 8. A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
- 12. CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
- 13. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- 14. WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
- 15. THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
- 18. A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
- 19. I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
- 20. CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
- 23. ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
- 27. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- 28. ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
- 31. A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).