The hardest crossword puzzle EVERRR

123456789101112131415
Across
  1. 2. Someone fraudulently trying to gain access to an unauthorized system.
  2. 4. Any security practice put in place to mitigate a security event or incident from occurring.
  3. 5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
  4. 9. Most useful tool in cybersecurity, pretty much.
  5. 11. The practice of utilizing trial and error to guess credentials.
  6. 12. Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
  7. 13. Copies of data
  8. 14. A condiment
  9. 15. describes a minor disruption to the digital landscape that is thought to be unintentional
Down
  1. 1. A data file through which the identity, authenticity and reliability of a website or web application is established.
  2. 3. Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
  3. 6. A possibility of being attacked or harmed
  4. 7. responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. 8. A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
  6. 10. A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.