Across
- 3. With cloud computing they talk about this notorious number of threats
- 4. one of the first antivirus programs, released in 1987
- 7. this hat color is used when referring to professional hackers recruited specifically to find security gaps.
- 8. This famous code was broken or "hacked" during the second world war
- 9. The first convicted computer criminals, called the 414's got the name from their hometown in
- 10. To use a program, site or system disguised as something else to acquire data
- 12. The company behind the largest cyber-attack in history
- 14. Silvertail plugin for real-time cyber detection
- 16. ECAT stands for Enterprise Compromise ... Tool)
- 18. A tactic used in ancient Greece to deceive a defense (one word)
- 21. ... engineering is the human way to breach a company's information security.
- 22. a non-profit organization working for the security within the cloud
- 24. Alan ... invented this test to measure machines ability to be mistaken for a human being.
- 26. A DOS-Attack is a Denial-of- ... what?
- 27. last name of the founder for the laws of robotics, ensuring our security from acts of A.I.
Down
- 1. a security system that controls the incoming and outgoing network traffic
- 2. A part of the attack used when RSA was hacked in 2011
- 5. a small simple program used to monitor a computers keystrokes
- 6. this symbolical relative used complete surveillance in the book 1984
- 11. SecurID runs on this Operative System
- 12. the practice of secure communication
- 13. This solution can Pull a complete live memory dump from a suspect machine
- 15. The physical "key" that RSA use to create an authentication code
- 17. RSA BSAFE provides security products for this IT-division
- 19. The A in RSA
- 20. programmers that find and work with weaknesses in computer systems
- 22. this annoying verification on the web is used to make sure that you are human by twisting a word.
- 23. a term to describe a flaw or fault in a computer program or system
- 25. the organizational executive responsible for IT security.
