Cyber security - 3
Across
- 4. The process of sharing cryptographic keys securely.
- 7. A security risk originating from within the organization.
- 8. A system that monitors and controls incoming and outgoing network traffic.
- 9. A set of procedures for identifying and handling security incidents.
- 12. Reviewing logs to detect suspicious or unauthorized activities.
- 15. Creating an exact copy of a digital device for investigation.
Down
- 1. Guaranteeing the accuracy and completeness of data.
- 2. Controlling network access using device MAC addresses.
- 3. Strategies to detect and prevent threats from within the organization.
- 5. Taking advantage of vulnerabilities to gain access.
- 6. Sending IP packets with a false source IP address.
- 10. A function that converts data into a fixed-size string of characters.
- 11. Software or hardware that detects unauthorized access or anomalies.
- 13. A European regulation on data protection and privacy.
- 14. A system that actively blocks detected threats.