Across
- 2. A form of load balancing which hands out tasks in a repeating non-priority sequence
- 4. Unified Thread Management
- 7. A security stance based on a repeating process of locating the least secure element of an infrastructure and securing it
- 8. A detection method where all traffic or events that fail to match the normal baselines are considered abnormal and potentially malicious
- 9. Access Control List
- 11. Similar to Defense in Depth, in that it supports multiple layers but unlike it in that it uses a different security mechanism at each of the layers
- 14. A technique of storing or copying log events to a central logging server
- 15. The maximum communication or transmission capacity of a network segment
- 16. A detection method where all traffic or events that match an item in the database is considered abnormal and potentially malicious
- 17. A notification from a firewall that a specific event or packet was detected
- 18. A hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic
Down
- 1. A detection method where all traffic or events that fail to match defined normal are considered anomalies and potentially malicious
- 3. Technique of load balancing that operates by sending the next ransaction to the firewall with the least current workload
- 4. The principle that for an organization’s security policy to be effective, everyone must be forced to work within it and follow its rules
- 5. A written expression of an item of concern and one or more actions to take when the item of concern appears in traffic
- 6. A means of providing faster access to static content for external users accessing internal Web servers
- 10. An organizations’ filtering configuration: What should be allowed and what should be blocked
- 12. An event that does not trigger an alarm but should have
- 13. An event that triggers an alarm but should not have
- 19. Write-once read-many form of storage device
