Redalert ICS CTF

123456789101112
Across
  1. 2. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  2. 5. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  3. 7. May sometime be known as Industroyer
  4. 11. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  5. 12. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
  1. 1. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  2. 3. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  3. 4. The world’s most murderous malware
  4. 6. A network security measure employed on one or more computers to physically isolated from another network.
  5. 8. This malware was reported to be involved with the 2015 cyber attacks in Ukraine
  6. 9. A RAT targeting the ICS industry by the hacking group Dragonfly
  7. 10. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.