Zscaler Crossword puzzle
Across
- 4. (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
- 5. Software update that fixes security vulnerabilities or improves the functionality of a program.
- 8. (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
- 9. Weakness or flaw in a system that can be exploited by attackers.
- 12. Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
- 13. Secret combination of characters used to authenticate and gain access to a system or account.
- 15. Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
- 16. Software designed to detect, prevent, and remove malicious software from a computer system.
- 17. Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
- 18. Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
- 20. Manipulation of individuals to gain unauthorized access or sensitive information.
- 21. Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
- 22. Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- 1. Creates a connection over a public network, allowing users to access private networks remotely.
- 2. Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
- 3. Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
- 6. Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
- 7. Acts as a barrier between a trusted internal network and an untrusted external network.
- 10. Converts data into a format that can only be read or accessed with the correct decryption key.
- 11. Broad term for malicious software designed to harm or exploit computer systems.
- 14. Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
- 15. Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
- 19. Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.