Key Cybersecurity Vocabulary

123456789
Across
  1. 1. Tools that collect and analyze security data to detect threats
  2. 3. Detects and blocks suspicious activities in real time
  3. 7. Keeping systems up to date with software fixes to close security hole
  4. 9. A network of infected computers controlled by an attacker, often used for DDoS
Down
  1. 1. Tricking people into revealing confidential information
  2. 2. Monitors network traffic for suspicious activity and alerts administrators
  3. 4. Probing a system for open ports to find possible vulnerabilities
  4. 5. A fake communication used to trick users into giving up sensitive data
  5. 6. Requires two methods to verify a user’s identity
  6. 8. Verifying the identity of a user, device, or process before allowing access