1 14
2 18
3
4
5/13 17
6
7/16
8
9
10
15
11
12

Crossword: Network Security

Across

1. The process of filtering and validating user input before using it in an application.

2. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

3. Devices that have been compromised by malware and are part of a botnet.

4. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.

5. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.

6. Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.

7. Malware that displays unwanted advertisements or redirects browsers to advertising websites.

8. An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access.

9. The act of manipulating people into performing actions or divulging confidential information.

10. Security risks posed by individuals within an organization, such as employees or former employees.

11. Malicious software designed to harm or exploit computers or networks.

12. Individuals or groups who control and manage botnets of infected devices.

Down

13. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.

14. A cryptographic system that uses the same key for both encryption and decryption.

15. A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.

16. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.

17. Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.

18. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓