My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Talk To Me in Cybersecurity

Horizontales
The psychological manipulation of people into performing actions or divulging confidential information
Refers to a company security policy that allows for employees’ personal devices to be used in business
A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
Devices or software designed to find and prevent malicious activity on corporate networks
Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
A type of authentication method where the proof of a user’s identity is gained by different independent sources
Surveillance software that can record every keystroke made on a computer’s keyboard
Verticales
A software process to enable computer users to access more than one application using a single set of credentials, such as a username and password
A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
A framework of policies and technologies to ensure that the right users have the appropriate access to technology resources
Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
Computer program used to prevent, detect, and remove malware
A formal and approved list of users who have defined access rights to an asset