Across
- 3. ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- 6. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
- 8. ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- 9. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- 10. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
- 1. _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- 2. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
- 4. A software update released to fix vulnerabilities and improve security in applications or systems.
- 5. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- 7. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
