Security Crossword
Across
- 4. The process of managing updates for software applications and technologies.
- 5. Intermediary server for network requests.
- 8. Unauthorized data access incident.
- 9. A firewall that monitors and filters traffic between a web application and the internet.
- 13. Attempt to obtain sensitive information.
- 15. Testing a system for vulnerabilities by simulating attacks.
- 16. Algorithm for performing encryption or decryption.
- 18. A collection of tools used by an attacker to maintain access to a system while hiding their presence.
- 20. Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
- 1. Measures taken to protect the integrity and usability of networks.
- 2. Running programs in a controlled environment to prevent them from affecting the host system.
- 3. A formal document outlining how security measures are implemented within an organization.
- 6. Protection measures applied to end-user devices like computers and mobile devices.
- 7. A framework for managing digital certificates and public-key encryption.
- 10. A systematic evaluation of the security of a company’s information system.
- 11. An entity that issues digital certificates for secure communications.
- 12. Protocol for establishing an encrypted link between a server and a client.
- 14. Permissions granted to users regarding what they can do with resources on a system.
- 17. A type of malware that replicates itself to spread to other computers without user intervention.
- 19. Software that secretly collects user information.