Network security management

12345678910
Across
  1. 2. Tools for monitoring and analyzing network traffic
  2. 4. A mechanism for verifying user identity
  3. 7. A system for detecting abnormal network behavior
  4. 9. Protocol for encrypted data transmission
  5. 10. Technologies to prevent the spread of malicious software
Down
  1. 1. Technologies used to protect data transmission in networks
  2. 3. Practice of protecting computer networks from unauthorized access
  3. 5. A Strategy for Restricting Network Resource Access
  4. 6. Provide a secure channel for remote access to network devices
  5. 8. A device for detecting and blocking network attacks