Cyber securuty - 2

123456789101112131415161718192021222324252627282930
Across
  1. 2. Exploiting a bug or vulnerability to gain elevated access rights.
  2. 4. A network protocol for collecting IP traffic information.
  3. 6. A framework for managing digital keys and certificates.
  4. 8. A server that acts as an intermediary for requests from clients.
  5. 9. Reviewing logs to detect suspicious or unauthorized activities.
  6. 11. An attack where the attacker secretly intercepts communication between two parties.
  7. 13. A system that actively blocks detected threats.
  8. 14. A system that monitors and controls incoming and outgoing network traffic.
  9. 16. Software designed to cause damage or unauthorized actions.
  10. 17. A security risk originating from within the organization.
  11. 18. A set of procedures for identifying and handling security incidents.
  12. 19. Actions taken after gaining access, like data extraction.
  13. 22. Software or hardware that detects unauthorized access or anomalies.
  14. 23. Taking advantage of vulnerabilities to gain access.
  15. 25. Strategies to detect and prevent threats from within the organization.
  16. 27. Guaranteeing the accuracy and completeness of data.
  17. 28. A software update designed to fix vulnerabilities or bugs.
  18. 29. Controlling network access using device MAC addresses.
  19. 30. Sending IP packets with a false source IP address.
Down
  1. 1. A framework for developing and executing exploit code.
  2. 3. Dividing a network into segments to improve security.
  3. 5. Preventing parties from denying their actions or commitments.
  4. 7. The process of applying updates to software to fix vulnerabilities.
  5. 10. A function that converts data into a fixed-size string of characters.
  6. 12. Creating an exact copy of a digital device for investigation.
  7. 15. scanning, Checking for open ports to identify services running on a system.
  8. 20. A European regulation on data protection and privacy.
  9. 21. The process of sharing cryptographic keys securely.
  10. 24. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  11. 26. A tool that captures and analyzes network traffic.