Across
- 4. Activity involving the exploration of computer or network ports to identify potential vulnerabilities
- 5. The process of identifying, assessing, and prioritizing risks to an organization's assets.
- 6. A set of rules or guidelines that define the acceptable use and security measures within an organization.
- 7. A process of thorough examination and analysis to ensure information security compliance
- 8. Decoy systems designed to attract and detect unauthorized access attempts.
- 9. Secure network for internal communication and collaboration within an organization
Down
- 1. The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
- 2. A network security device that monitors and controls incoming and outgoing network traffic.
- 3. Incorrect identification of a harmless activity or file as malicious.
- 6. A firewall that acts as an intermediary between internal network clients and external servers.
