Cyber security - 4
Across
- 1. A tool that captures and analyzes network traffic.
- 2. Actions taken after gaining access, like data extraction.
- 3. A server that acts as an intermediary for requests from clients.
- 7. A network protocol for collecting IP traffic information.
- 8. A software update designed to fix vulnerabilities or bugs.
- 10. Preventing parties from denying their actions or commitments.
- 11. Dividing a network into segments to improve security.
- 12. Software designed to cause damage or unauthorized actions.
- 13. A framework for developing and executing exploit code.
- 14. scanning, Checking for open ports to identify services running on a system.
Down
- 1. Exploiting a bug or vulnerability to gain elevated access rights.
- 4. A framework for managing digital keys and certificates.
- 5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 6. The process of applying updates to software to fix vulnerabilities.
- 9. An attack where the attacker secretly intercepts communication between two parties.