Key Cybersecurity Vocabulary
Across
- 1. Tools that collect and analyze security data to detect threats
- 3. Detects and blocks suspicious activities in real time
- 7. Keeping systems up to date with software fixes to close security hole
- 9. A network of infected computers controlled by an attacker, often used for DDoS
Down
- 1. Tricking people into revealing confidential information
- 2. Monitors network traffic for suspicious activity and alerts administrators
- 4. Probing a system for open ports to find possible vulnerabilities
- 5. A fake communication used to trick users into giving up sensitive data
- 6. Requires two methods to verify a user’s identity
- 8. Verifying the identity of a user, device, or process before allowing access