1 15
16
14
12 2
3
4
5
6
7
13
8
9
10
11

Crossword: Network Security

Across

1. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.

2. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.

3. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.

4. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.

5. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.

6. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.

7. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.

8. The process of converting plaintext into ciphertext using an encryption algorithm and a key.

9. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.

10. A secure network connection that allows remote users to access a private network over the internet securely.

11. Security risks posed by individuals within an organization, such as employees or former employees.

Down

12. A fraudulent site created to mimic a legitimate platform.

13. The process of converting ciphertext into plaintext using a decryption algorithm and a key.

14. An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access.

15. A cryptographic system that uses the same key for both encryption and decryption.

16. In asymmetric encryption, a key that is publicly available and used for encryption.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓