SOC Terminology

123456789101112131415
Across
  1. 1. A weakness in a system that can be exploited by hackers
  2. 3. A network of infected computers secretly controlled by a central attacker
  3. 6. Physical characteristics like fingerprints or facial recognition used for identification
  4. 8. A recently discovered software flaw that the vendor has not yet fixed
  5. 9. The science of secure communication and writing in secret codes
  6. 10. Malicious software designed to hide the existence of certain processes or programs
  7. 12. Falsifying data to disguise malicious communication as coming from a trusted source
  8. 13. A physical device like a laptop or phone that connects to a corporate network
  9. 15. Software that secretly records every letter typed on a keyboard
Down
  1. 2. The process of verifying the identity of a user or system
  2. 4. The process of converting unreadable scrambled data back into plain text
  3. 5. A cyber attack that redirects a user's website traffic to a fake site
  4. 7. A hidden method used to bypass normal security and access a system
  5. 11. Malware that demands payment to restore access to your data
  6. 14. An attack that completely overwhelms a system with a massive flood of internet traffic