Cyber security - 3

123456789101112131415
Across
  1. 4. The process of sharing cryptographic keys securely.
  2. 7. A security risk originating from within the organization.
  3. 8. A system that monitors and controls incoming and outgoing network traffic.
  4. 9. A set of procedures for identifying and handling security incidents.
  5. 12. Reviewing logs to detect suspicious or unauthorized activities.
  6. 15. Creating an exact copy of a digital device for investigation.
Down
  1. 1. Guaranteeing the accuracy and completeness of data.
  2. 2. Controlling network access using device MAC addresses.
  3. 3. Strategies to detect and prevent threats from within the organization.
  4. 5. Taking advantage of vulnerabilities to gain access.
  5. 6. Sending IP packets with a false source IP address.
  6. 10. A function that converts data into a fixed-size string of characters.
  7. 11. Software or hardware that detects unauthorized access or anomalies.
  8. 13. A European regulation on data protection and privacy.
  9. 14. A system that actively blocks detected threats.