Crossword 3

12345678910111213
Across
  1. 2. A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
  2. 4. A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  3. 7. A security concept that ensures that data is only accessible to those with authorized access.
  4. 9. A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
  5. 11. A security protocol that ensures privacy between communicating applications and their users on the internet.
  6. 12. A type of firewall that filters traffic between a trusted and an untrusted network.
  7. 13. A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
  1. 1. A security measure that involves hiding internal IP addresses.
  2. 3. A method used to verify the integrity and authenticity of a message, software, or digital document.
  3. 5. A security model that enforces strict access controls and compartmentalization.
  4. 6. A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
  5. 8. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  6. 10. A type of security threat that is disguised as legitimate software.