Across
- 4. Yubi's policy that defines the principles and responsibilities for securely managing user authentication and access permissions.
- 9. Yubi's structured process of classifying, labeling, and protecting data based on its sensitivity and importance.
- 12. A software vulnerability that allows an attacker to execute arbitrary code.
- 13. The practice of allowing only authorized users to access certain resources.
- 14. The practice of granting the minimum access necessary for users to perform their tasks.
- 16. The process of converting plaintext into unreadable, scrambled data for security.
- 18. A method for simulating real-world attacks to test security defences
- 19. A cryptographic technique used to prove knowledge of a secret without revealing the secret.
- 22. A cryptographic technique that involves hiding data within other data.
- 24. A software vulnerability that is unknown to the software vendor.
- 25. Yubi's framework for quickly recovering from cyber incidents and ensuring minimal disruption to operations.
Down
- 1. The unauthorized access and theft of confidential information.
- 2. Type of attack where an attacker monitors and captures data in transit.
- 3. Yubi's systematic practice of disguising or obfuscating sensitive data to protect it from unauthorized access.
- 5. A security incident where a user receives fraudulent emails attempting to trick them.
- 6. A malicious software that demands a ransom from the victim.
- 7. A network security device that filters incoming and outgoing network traffic
- 8. A type of attack where an attacker pretends to be someone else to gain unauthorized access.
- 10. A security measure that ensures data is not altered during transmission.
- 11. A system's ability to resist unauthorized access and protect against cyberattacks.
- 15. A security model that assumes no trust, even within the network.
- 17. Yubi's strategic choice to safeguard data within its own borders.
- 20. A process of analyzing network traffic patterns for anomalies.
- 21. A technique for identifying and managing security risks.
- 23. A system or network designed to attract attackers to collect threat intelligence.