Module 6 Vocabulary

123456789101112
Across
  1. 4. A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
  2. 5. A device that monitors, logs, detects, and reacts to stop or prevent security breaches
  3. 7. a type of IDS that uses behavior for decision making
  4. 9. hardware firewall that protects the entire network
  5. 10. combines several layers of security and networking services into one solution
  6. 12. A buffer network that sits between the private network and an untrusted network
Down
  1. 1. the main benefit of an ACL
  2. 2. a type of IDS that uses patterns for decision making
  3. 3. the type of computer that may be found inside a screened subnet
  4. 6. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules
  5. 8. software firewall that protects a single device
  6. 11. Firewalls use filtering rules, which are sometimes called access control lists, to identify allowed and blocked traffic.