CyberDSA D3

12345678910
Across
  1. 4. Applying updates to fix software flaws.
  2. 5. Method of guessing passwords by trying all possibilities.
  3. 7. Security barrier that controls network traffic flow.
  4. 9. Isolated environment to safely run suspicious files.
  5. 10. System for analyzing and correlating security events.
Down
  1. 1. Period of active connection between a user and a system.
  2. 2. Technology that prevents sensitive data from leaving a network.
  3. 3. Authorized simulated cyberattack to test security defenses.
  4. 6. Algorithm for encrypting and decrypting information.
  5. 8. Recorded events and activities on a system or network.