1/16 18
2
19
3
5 4
6 17
15 7
8
9
10
11
12
13
14

Crossword: Network Security Threats

Across

1. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.

2. Malware that secretly gathers information about a person or organization without their consent.

3. A self-signed certificate issued by a Certificate Authority that establishes trust in the entire certificate chain.

4. Ensuring that information remains confidential in asymmetric encryption.

5. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.

6. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.

7. The process of invalidating a digital certificate before its expiration date due to compromise or other reasons.

8. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.

9. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.

10. A type of symmetric encryption algorithm that operates on fixed-length blocks of data.

11. Devices that have been compromised by malware and are part of a botnet.

12. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.

13. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.

14. A form of attack where an unauthorized party intercepts and monitors communication on a network.

Down

15. A cryptographic technique used to verify the authenticity of digital messages or documents.

16. A cryptographic key that is kept secret and used for decryption or creating digital signatures.

17. A popular asymmetric encryption algorithm used for secure communication and data protection.

18. A type of symmetric encryption algorithm that encrypts data one bit at a time.

19. A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓