Across
- 2. A code name made for collecting large amounts of data regarding individuals.
- 5. A malware that requests the payment of a fee to unlock encrypted files.
- 6. The company behind February’s largest security conference.
- 8. A software weakness which allows an attacker to gain access to a system.
- 12. Had opened the Cybertech2014.
- 13. A common hacking technic that relies on a typographical error when typing a website address.
- 15. Using something to one’s own advantage.
- 17. An exploit technique used for malicious code execution.
- 19. An attack that exploits an unknown vulnerability in software.
- 20. A table of legitimate files and processes.
- 21. Malicious software, designed to hide its processes or programs.
Down
- 1. A Security company founded by Kevin Mandia.
- 3. The social GPS.
- 4. A form of attack using psychological manipulation of people.
- 7. A small piece of code used as the payload in exploitation.
- 9. A common suite for penetration testing and exploitation.
- 10. The Anonymous attack against Ukraine government data.
- 11. A cyber unit under China’s 2nd Bureau of the PLA.
- 14. A technology that is designed to detect potential data breaches and prevent them.
- 16. An attempt to acquire information by masquerading as a trustworthy entity.
- 18. A symmetric-key block cipher.
- 21. Are you dead yet?
