Yubi Crossword Challenge

12345678910111213141516171819202122232425
Across
  1. 4. Yubi's policy that defines the principles and responsibilities for securely managing user authentication and access permissions.
  2. 9. Yubi's structured process of classifying, labeling, and protecting data based on its sensitivity and importance.
  3. 12. A software vulnerability that allows an attacker to execute arbitrary code.
  4. 13. The practice of allowing only authorized users to access certain resources.
  5. 14. The practice of granting the minimum access necessary for users to perform their tasks.
  6. 16. The process of converting plaintext into unreadable, scrambled data for security.
  7. 18. A method for simulating real-world attacks to test security defences
  8. 19. A cryptographic technique used to prove knowledge of a secret without revealing the secret.
  9. 22. A cryptographic technique that involves hiding data within other data.
  10. 24. A software vulnerability that is unknown to the software vendor.
  11. 25. Yubi's framework for quickly recovering from cyber incidents and ensuring minimal disruption to operations.
Down
  1. 1. The unauthorized access and theft of confidential information.
  2. 2. Type of attack where an attacker monitors and captures data in transit.
  3. 3. Yubi's systematic practice of disguising or obfuscating sensitive data to protect it from unauthorized access.
  4. 5. A security incident where a user receives fraudulent emails attempting to trick them.
  5. 6. A malicious software that demands a ransom from the victim.
  6. 7. A network security device that filters incoming and outgoing network traffic
  7. 8. A type of attack where an attacker pretends to be someone else to gain unauthorized access.
  8. 10. A security measure that ensures data is not altered during transmission.
  9. 11. A system's ability to resist unauthorized access and protect against cyberattacks.
  10. 15. A security model that assumes no trust, even within the network.
  11. 17. Yubi's strategic choice to safeguard data within its own borders.
  12. 20. A process of analyzing network traffic patterns for anomalies.
  13. 21. A technique for identifying and managing security risks.
  14. 23. A system or network designed to attract attackers to collect threat intelligence.