Threat Intelligence (Medium)

1234567891011
Across
  1. 4. A type of cyberattack that uses deception to trick individuals into revealing sensitive information.
  2. 6. A software vulnerability that is known and can be exploited by attackers.
  3. 9. The process of analyzing and evaluating threats to identify potential risks and vulnerabilities.
  4. 10. A malicious software that disguises itself as legitimate software to gain unauthorized access or cause harm.
  5. 11. The process of gathering and analyzing information to identify and mitigate potential threats.
Down
  1. 1. An individual or group that conducts unauthorized activities to gain access to computer systems.
  2. 2. A technique used to deceive individuals or systems by pretending to be a trusted entity.
  3. 3. The process of identifying, categorizing, and prioritizing potential threats or vulnerabilities.
  4. 5. A set of predefined rules or criteria used to identify potential threats or suspicious activities.
  5. 7. An attack in which multiple compromised devices are used to flood a network or website with traffic.
  6. 8. A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents.