My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity Awareness Month 2024

Horizontales
A range of tactics that criminals can utilize that specialize in "Hacking people" (6,11)
What is the second word found in Section III (3) paragraph H of the Synaptics Acceptable Use Policy. (11)
A self-replicating virus (4)
A covert channel attack technique that uses electromagnetic emissions from electronic devices to leak sensitive information. (7,6)
An efficient secret sharing algorithm for distributing private information among a group. (7,6,7)
An attack where physical access is gained to a system, and malicious software or hardware is installed, often during the manufacturing or distribution process to compromise devices before use. (4,4,6)
A malicious code set to trigger under specific conditions, causing harm to systems or data. (5,4)
The theme of Cybersecurity Awareness Month 2024. (6,3,5)
Open-source vulnerability scanning tool, GUI variant. (6)
A virus that modifies it's code each time it replicates but keeps the same underlying structure. (11)
What famous networking model is commonly referenced by the mnemonic "Please Do Not Trust Security Professionals At-all" (3,5)
Verticales
This Linux distribution that provides a range of penetration testing tools shares it's name with the Hindu Goddess of Death and Rebirth (4)
Not Spectre, CVE-2017-5754 (8)
A complex, high-level obfuscation technique used by malware to dynamically rewrite its code to avoid detection by static analysis. (12,4)
A famous early 2000s email worm named after a tennis star, which tricked users into opening a fake picture file. (4,10,5)
This malicious program shares it's name with a famous battle tactic used in ancient Greece. (6)
A security vulnerability that affects the security of SSL/TLS encryption used to protect data transmitted over the internet. (5,6)
An attack where an adversary places themselves between a user and a communication system to intercept and possibly alter data. (3,2,3,6)
A snack enjoyed by a famous yellow bear, also a system or network intentionally exposed to bait attackers. (8)
Apples are to fruit what Infosec tools are to "S_ _ ware" (7)