Across
- 2. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
- 5. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
- 7. May sometime be known as Industroyer
- 11. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
- 12. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
- 1. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
- 3. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
- 4. The world’s most murderous malware
- 6. A network security measure employed on one or more computers to physically isolated from another network.
- 8. This malware was reported to be involved with the 2015 cyber attacks in Ukraine
- 9. A RAT targeting the ICS industry by the hacking group Dragonfly
- 10. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
