CyberSecurity Terminologies Check!

123456789101112131415
Across
  1. 4. A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
  2. 10. A decoy system or network that serves to attract potential attackers.
  3. 11. A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
  4. 12. Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
  5. 13. Locks the computer or data and demands a payment to release the machine.
  6. 15. identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
  1. 1. The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
  2. 2. A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
  3. 3. A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
  4. 5. A process that ensures and confirms a user’s identity.
  5. 6. A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
  6. 7. A type of surveillance software that records keystrokes made by a user
  7. 8. Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
  8. 9. Spread to other machines on a network.Red : A color
  9. 14. A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.