Across
- 3. A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic.
- 5. Malicious software specifically designed to cause harm, disrupt operations, or steal data.
- 6. A system that only monitors and alerts administrators about malicious network traffic, but does not actively block it (Abbreviation).
- 9. A potential danger, such as a hacker or a virus, that could exploit a weakness in a computer system.
- 12. A system that collects, correlates, and analyzes security logs from various devices like firewalls and endpoints (Abbreviation).
- 13. A decoy system or network set up to look attractive to cyber attackers in order to study their tactics.
- 15. The zone where external-facing servers (like web and email) are placed to keep them separate from the secure internal network (Abbreviation).
- 16. The secure, encrypted path that a Virtual Private Network (VPN) creates through an untrusted network like the internet.
- 17. A logical connection point that firewalls can block to prevent certain types of traffic, such as 80 for web traffic.
- 19. A defense mechanism designed to intentionally slow down network connections to frustrate automated scanning tools.
- 20. A vulnerability or attack that is unknown to the software vendor and has no patch available yet (No spaces).
- 22. A mode that allows a network interface card (NIC) to read all traffic passing on the network segment, not just traffic addressed to it.
- 24. A security system that actively blocks or drops malicious traffic, rather than just alerting administrators (Abbreviation).
- 25. A stealthy type of malware designed to hide its presence deep within the operating system to avoid detection by standard antivirus.
- 26. A technology that hides multiple internal private IP addresses behind a single public IP address (Abbreviation).
- 28. The type of inspection firewall that remembers the context of active network connections.
Down
- 1. Creates a secure, encrypted tunnel through an untrusted network like the internet (Abbreviation).
- 2. The physical or logical device that collects network traffic data for an Intrusion Detection System to analyze.
- 4. A device that combines a firewall, intrusion prevention, and antivirus capabilities into one single physical appliance (Abbreviation).
- 7. The type of detection that relies on a constantly updated database of known threat patterns to identify malicious activity.
- 8. An intermediary server that makes web requests on behalf of internal users and hides internal IP addresses.
- 10. The process of verifying a user's identity before granting them access to a system.
- 11. A secure, isolated virtual environment used to safely run and test untrusted code without risking the main computer.
- 14. The physical hardware address assigned to a network interface card (Abbreviation).
- 18. The secure holding area where antivirus software places an infected file so it cannot execute and spread.
- 21. The modern, advanced replacement for traditional antivirus that monitors behavior and responds to threats (Abbreviation).
- 23. The type of detection that learns what "normal" network traffic looks like and triggers an alert when something deviates from that baseline.
- 27. A basic filtering firewall inspects these individual units of data passing through the network.
