Australian Signals Directorate’s Post

Gear up for some #FridayFun with our cybersecurity crossword challenge! Do you know the answers? Comment below. ACROSS 2. Malicious software designed to disrupt, damage, or gain unauthorised access to a computer system. (7) 5. Service that encrypts your internet traffic and protects your information online. (3) 6. The practice of techniques for securing communications in which plaintext data is converted through a cipher into ciphertext. (12) 7. A network device that filters incoming and outgoing network data based on a series of rules. (8) 8. A piece of software designed to update a computer program or its supporting data, to fix or improve it. (5) 9. A small text file stored by a web browser that retains user preferences and session information, often tracked for marketing purposes. (6) DOWN 1. A sequence of words used for authentication that is longer and more secure than a simple password. (10) 3. Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system. (14) 4. Process of converting information or data into a code, especially to prevent unauthorised access. (10)

  • No alternative text description for this image

Top-Down 1. Passphrase (10) 3. Authentication (14) 4. Encryption (10) Left-Right 2. Malware (7) 5. VPN (3) 6. Cryptography (12) 7. Firewall (8) 8. Patch (5) 9. Cookie (6) 😎

Houman D.

Cyber Security Analyst at Melbourne Archdiocese Catholic Schools

4w

1. passphrase 2. malware 3. authentication 4. encryption 5. vpn 6. cryptography 7. firewall 8. patch 9. cookie

Martin Back

CSMP® | M.ISMI® | Security Risk Management | International Protective Security Professional | Security Operations | Investigations | Extensively Travelled | Engaging | Intelligence Led Solutions | Veteran | Father

4w

ACROSS 2 - Malware 5 - VPN 6 - Cryptography 7 - Firewall 8 - Patch 9 - Cookie DOWN 1 - Passphrase 3 - Authentication 4 - Encryption

Like
Reply
Muhammad K.

Solutions Engineer | Security Consultant/Architect | Cyber Security Researcher | Tech Lead

4w

ACROSS 2. Malware 5. VPN 6. Cryptography 7. Firewall 8. Patch 9. Cookie DOWN 1. Passphrase 3. Authentication 4. Encryption

Couldn’t think of 5&6 but got the rest.

Like
Reply
Rocky Heckman

AI | AI Risk Mitigation | Cybersecurity | OWASP AI

2w

I do know these. All of them.

Like
Reply

🇦🇺🇬🇧🇺🇸

Like
Reply
Adam McMullen

Cybersecurity Enthusiast | Pursuing Studies & Career Transition | Aspiring GRC Professional

4w

Malware VPN Cryptography Firewall Patch Cookie Passphrase Authentication Encryption

Like
Reply
Frank Jia Li

Master of Cybersecurity Candidate | NV2 Cleared | AWS AI & ML Scholar | Experienced Global MBA

4w

1-PASSPHRASE 2-MALWARE 3-AUTHENTICATION 4-ENCRYPTION 5-VPN 6-CRYPTOGRAPHY 7-FIREWALL 8-PATCH 9-COOKIE

Mahesh Thakur

Cyber Security Engineer

4w

I agree!

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics