Cybersecurity 2
Across
- 3. This is popular network protocol analyzer, or an application that captures packets from a network connection
- 5. 95% of all firewalls fail due to this
- 7. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
- 8. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
Down
- 1. This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
- 2. ______ detection is the process of identifying cyberattacks trying to enter a machine or network
- 4. The process of converting information or data into a code, especially to prevent unauthorized access
- 6. A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization