Across
- 2. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
- 4. _________ Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network.
- 8. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
- 1. _______ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- 3. _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- 5. ______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
- 6. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.
- 7. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.