PassoverCyber

1234567891011121314
Across
  1. 2. State of a system that has been thoroughly checked
  2. 5. A model that trusts nothing by default, even inside the network
  3. 7. System that does "bedikat chametz" and looks for vulnerabilities (a bit like “” for code)
  4. 8. Bread eaten at Passover
  5. 9. mechanism that records attempts to access systems and security events
  6. 11. Security practice of regularly updating software to fix known weaknesses
  7. 12. The Policy book we read at the Seder
  8. 13. Type of malware that encrypts files and demands payment
Down
  1. 1. Holiday commemorating the Exodus
  2. 3. Process of proving you are who you claim to be
  3. 4. Type of attack that floods a system with traffic (like locusts)
  4. 6. Protection that scrambles data so only authorized parties can read it
  5. 10. Principle that says users should only have the permissions they need
  6. 11. Common method attackers use to trick users into revealing passwords
  7. 14. Security layer added after a password (like an extra doorpost protection)