1 13
2
3
4
5/14
12
6/15
7
16
8
9
10
11

Crossword: Network Security

Across

1. A type of malicious software that can replicate itself and spread to other computers.

2. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

3. The act of manipulating people into performing actions or divulging confidential information.

4. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.

5. The process of filtering and validating user input before using it in an application.

6. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.

7. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.

8. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.

9. An organization that issues digital certificates and verifies the authenticity of entities.

10. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.

11. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.

Down

12. Security risks posed by individuals within an organization, such as employees or former employees.

13. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.

14. Devices that have been compromised by malware and are part of a botnet.

15. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.

16. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓