Taldor's "Go Cyber" Competition

123456789101112131415161718192021
Across
  1. 2. A code name made for collecting large amounts of data regarding individuals.
  2. 5. A malware that requests the payment of a fee to unlock encrypted files.
  3. 6. The company behind February’s largest security conference.
  4. 8. A software weakness which allows an attacker to gain access to a system.
  5. 12. Had opened the Cybertech2014.
  6. 13. A common hacking technic that relies on a typographical error when typing a website address.
  7. 15. Using something to one’s own advantage.
  8. 17. An exploit technique used for malicious code execution.
  9. 19. An attack that exploits an unknown vulnerability in software.
  10. 20. A table of legitimate files and processes.
  11. 21. Malicious software, designed to hide its processes or programs.
Down
  1. 1. A Security company founded by Kevin Mandia.
  2. 3. The social GPS.
  3. 4. A form of attack using psychological manipulation of people.
  4. 7. A small piece of code used as the payload in exploitation.
  5. 9. A common suite for penetration testing and exploitation.
  6. 10. The Anonymous attack against Ukraine government data.
  7. 11. A cyber unit under China’s 2nd Bureau of the PLA.
  8. 14. A technology that is designed to detect potential data breaches and prevent them.
  9. 16. An attempt to acquire information by masquerading as a trustworthy entity.
  10. 18. A symmetric-key block cipher.
  11. 21. Are you dead yet?