Across
- 5. examines the current state of an endpoint before it can connect
- 7. Removing or dismantling a technology
- 10. A device that distributes resources and services to devices connected to the network
- 11. Designed to limit the spread of malware
- 13. Automatically blocking an attack when it occurs
- 15. Fake data that has been added to live production systems
- 17. A physically separated network
- 18. Known attack patterns
- 19. A network set up with intentional vulnerabilities
Down
- 1. A device that distributes work across a network
- 2. The means for communication in a zero-trust architecture
- 3. Verification of a user in a zero-trust architecture
- 4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- 6. server within the DMZ that is used to connect two dissimilar security zones
- 8. A user in a zero-trust architecture
- 9. Criteria for which a website is inaccessible to users
- 12. A network device that can forward packets across different computer networks
- 14. Keeping multiple instances of an attack surface separate
- 16. filtering entire domains
