Security Quiz

123456789101112131415161718192021222324252627
Across
  1. 3. With cloud computing they talk about this notorious number of threats
  2. 4. one of the first antivirus programs, released in 1987
  3. 7. this hat color is used when referring to professional hackers recruited specifically to find security gaps.
  4. 8. This famous code was broken or "hacked" during the second world war
  5. 9. The first convicted computer criminals, called the 414's got the name from their hometown in
  6. 10. To use a program, site or system disguised as something else to acquire data
  7. 12. The company behind the largest cyber-attack in history
  8. 14. Silvertail plugin for real-time cyber detection
  9. 16. ECAT stands for Enterprise Compromise ... Tool)
  10. 18. A tactic used in ancient Greece to deceive a defense (one word)
  11. 21. ... engineering is the human way to breach a company's information security.
  12. 22. a non-profit organization working for the security within the cloud
  13. 24. Alan ... invented this test to measure machines ability to be mistaken for a human being.
  14. 26. A DOS-Attack is a Denial-of- ... what?
  15. 27. last name of the founder for the laws of robotics, ensuring our security from acts of A.I.
Down
  1. 1. a security system that controls the incoming and outgoing network traffic
  2. 2. A part of the attack used when RSA was hacked in 2011
  3. 5. a small simple program used to monitor a computers keystrokes
  4. 6. this symbolical relative used complete surveillance in the book 1984
  5. 11. SecurID runs on this Operative System
  6. 12. the practice of secure communication
  7. 13. This solution can Pull a complete live memory dump from a suspect machine
  8. 15. The physical "key" that RSA use to create an authentication code
  9. 17. RSA BSAFE provides security products for this IT-division
  10. 19. The A in RSA
  11. 20. programmers that find and work with weaknesses in computer systems
  12. 22. this annoying verification on the web is used to make sure that you are human by twisting a word.
  13. 23. a term to describe a flaw or fault in a computer program or system
  14. 25. the organizational executive responsible for IT security.