Across
- 2. _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- 4. Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
- 6. _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
- 7. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
- 8. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
- 1. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
- 3. _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
- 5. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.