Across
- 2. Security classification related to storage media like USB drives and disks
- 8. Software layer where users interact with systems
- 9. Security device that filters incoming and outgoing network traffic
- 12. Infrastructure that focuses on storing and managing data
- 13. A fake system designed to trap and study attackers
- 14. Security system that detects suspicious activities in a network
- 15. Minimum security standard that systems must follow
- 16. IT infrastructure responsible for managing communication between systems
Down
- 1. Type of IT infrastructure that includes servers, computers, and hardware
- 3. Tool used to scan networks and discover active devices
- 4. Process of strengthening an application by removing unnecessary features
- 5. A secure tunnel used to protect data over public networks
- 6. Security design that shows how security components are arranged in a network
- 7. Tool used to capture and analyze network traffic
- 10. Small update released to fix a specific security vulnerability
- 11. Physical security method that uses fingerprints or facial recognition
- 12. Network area that separates internal systems from the internet
