Chapter 9: Computer Security Technology Master Crossword

12345678910111213141516171819202122232425262728
Across
  1. 3. A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic.
  2. 5. Malicious software specifically designed to cause harm, disrupt operations, or steal data.
  3. 6. A system that only monitors and alerts administrators about malicious network traffic, but does not actively block it (Abbreviation).
  4. 9. A potential danger, such as a hacker or a virus, that could exploit a weakness in a computer system.
  5. 12. A system that collects, correlates, and analyzes security logs from various devices like firewalls and endpoints (Abbreviation).
  6. 13. A decoy system or network set up to look attractive to cyber attackers in order to study their tactics.
  7. 15. The zone where external-facing servers (like web and email) are placed to keep them separate from the secure internal network (Abbreviation).
  8. 16. The secure, encrypted path that a Virtual Private Network (VPN) creates through an untrusted network like the internet.
  9. 17. A logical connection point that firewalls can block to prevent certain types of traffic, such as 80 for web traffic.
  10. 19. A defense mechanism designed to intentionally slow down network connections to frustrate automated scanning tools.
  11. 20. A vulnerability or attack that is unknown to the software vendor and has no patch available yet (No spaces).
  12. 22. A mode that allows a network interface card (NIC) to read all traffic passing on the network segment, not just traffic addressed to it.
  13. 24. A security system that actively blocks or drops malicious traffic, rather than just alerting administrators (Abbreviation).
  14. 25. A stealthy type of malware designed to hide its presence deep within the operating system to avoid detection by standard antivirus.
  15. 26. A technology that hides multiple internal private IP addresses behind a single public IP address (Abbreviation).
  16. 28. The type of inspection firewall that remembers the context of active network connections.
Down
  1. 1. Creates a secure, encrypted tunnel through an untrusted network like the internet (Abbreviation).
  2. 2. The physical or logical device that collects network traffic data for an Intrusion Detection System to analyze.
  3. 4. A device that combines a firewall, intrusion prevention, and antivirus capabilities into one single physical appliance (Abbreviation).
  4. 7. The type of detection that relies on a constantly updated database of known threat patterns to identify malicious activity.
  5. 8. An intermediary server that makes web requests on behalf of internal users and hides internal IP addresses.
  6. 10. The process of verifying a user's identity before granting them access to a system.
  7. 11. A secure, isolated virtual environment used to safely run and test untrusted code without risking the main computer.
  8. 14. The physical hardware address assigned to a network interface card (Abbreviation).
  9. 18. The secure holding area where antivirus software places an infected file so it cannot execute and spread.
  10. 21. The modern, advanced replacement for traditional antivirus that monitors behavior and responds to threats (Abbreviation).
  11. 23. The type of detection that learns what "normal" network traffic looks like and triggers an alert when something deviates from that baseline.
  12. 27. A basic filtering firewall inspects these individual units of data passing through the network.