Tech AURA - Crossword Puzzle Competition

123456789101112131415
Across
  1. 2. A digital barrier that monitors and filters network traffic.
  2. 3. Newly launched application used for Business Continuity Management.
  3. 6. When an attacker masks their identity to appear as a trusted source.
  4. 7. A network of private computers infected with malicious software and controlled as a group.
  5. 8. A copy of data stored separately to be used if the original is lost.
  6. 9. Software that secretly records what you do on your computer.
  7. 10. Storing and accessing data over the internet instead of your computer's hard drive.
  8. 11. A threat that comes from someone within the organization.
  9. 12. A phishing attack conducted specifically via SMS/Text message.
  10. 13. The "R" in the CHIRAG framework.
  11. 14. Malware that locks your files until a payment is made.
  12. 15. A secret string of characters used to authenticate a user.
Down
  1. 1. The "R" in TECH AURA, referring to the ability to bounce back.
  2. 4. A weakness or "hole" in a system that can be exploited.
  3. 5. The "____ Engineering" trick of manipulating people into giving up secrets.
  4. 7. A phishing attack specifically targeting high-profile executives.
  5. 8. Converting information into a secret code to hide its true meaning.
  6. 9. A fraudulent attempt to get info by disguising as a trustworthy entity in an email.
  7. 13. An umbrella term for malicious software like viruses and worms.
  8. 15. A software update designed to fix a security "bug."