Chapter 3 - Countermeasure in Cybersecurity

12345678910111213141516
Across
  1. 2. Security classification related to storage media like USB drives and disks
  2. 8. Software layer where users interact with systems
  3. 9. Security device that filters incoming and outgoing network traffic
  4. 12. Infrastructure that focuses on storing and managing data
  5. 13. A fake system designed to trap and study attackers
  6. 14. Security system that detects suspicious activities in a network
  7. 15. Minimum security standard that systems must follow
  8. 16. IT infrastructure responsible for managing communication between systems
Down
  1. 1. Type of IT infrastructure that includes servers, computers, and hardware
  2. 3. Tool used to scan networks and discover active devices
  3. 4. Process of strengthening an application by removing unnecessary features
  4. 5. A secure tunnel used to protect data over public networks
  5. 6. Security design that shows how security components are arranged in a network
  6. 7. Tool used to capture and analyze network traffic
  7. 10. Small update released to fix a specific security vulnerability
  8. 11. Physical security method that uses fingerprints or facial recognition
  9. 12. Network area that separates internal systems from the internet