Crossword 3
Across
- 2. A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
- 4. A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- 7. A security concept that ensures that data is only accessible to those with authorized access.
- 9. A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
- 11. A security protocol that ensures privacy between communicating applications and their users on the internet.
- 12. A type of firewall that filters traffic between a trusted and an untrusted network.
- 13. A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
- 1. A security measure that involves hiding internal IP addresses.
- 3. A method used to verify the integrity and authenticity of a message, software, or digital document.
- 5. A security model that enforces strict access controls and compartmentalization.
- 6. A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
- 8. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 10. A type of security threat that is disguised as legitimate software.