1 16
2 18 19
3
4
5
14
6
7
8/15
9
10 17
11
12 13

Crossword: Network Security

Across

1. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.

2. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.

3. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.

4. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.

5. Tricking users into believing that their communication is coming from a trusted source when it isn't.

6. A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.

7. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.

8. A type of malicious software that can replicate itself and spread to other computers.

9. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.

10. The process of dividing a computer network into smaller subnetworks for improved security and performance.

11. A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.

12. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.

13. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.

Down

14. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.

15. Information used to authenticate a user's identity, typically consisting of a username and password.

16. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.

17. Malicious software designed to harm or exploit computers or networks.

18. A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity.

19. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓