Across
- 2. Granting access to resources based on identity and permissions.
- 3. Tools that monitor end-user devices to detect and respond to threats.
- 7. Blocking known harmful software or processes.
- 11. A program where organizations reward individuals for finding vulnerabilities.
- 15. An incident in which sensitive data is accessed without authorization.
- 16. Strategies and tools to prevent unauthorized data transfer or access.
- 17. Mechanisms that restrict access to systems and data.
- 22. Encryption using a pair of keys – one public and one private.
- 23. Becoming desensitized to frequent security alerts.
- 25. A modern security approach that provides integrated security across distributed systems.
- 26. A form of public key encryption based on elliptic curves.
- 28. A method or code that takes advantage of a vulnerability.
Down
- 1. A cryptographic technique for verifying the authenticity of digital messages.
- 4. An attack that floods a system with traffic to make it unavailable.
- 5. A network of infected computers controlled remotely.
- 6. An entity that issues digital certificates.
- 7. Trying many combinations to guess a password or encryption key.
- 8. A framework for developing, implementing, and monitoring IT governance.
- 9. Ensuring that information is accessible only to those authorized to have access.
- 10. Software used to collect, preserve, and analyze digital evidence.
- 12. The sum of all the points in a system that are exposed to an attacker.
- 13. Ensuring that authorized users have access to information and systems when needed.
- 14. Software that detects and removes malicious software.
- 17. Verifying the identity of a user, device, or system.
- 18. Routine practices for maintaining system health and improving security.
- 19. Documentation of who handled evidence and when.
- 20. Part of the internet not indexed by standard search engines and often used for illegal activity.
- 21. A security measure where a device is physically isolated from unsecured networks.
- 24. An attack that injects malicious scripts into content viewed by users.
- 27. A prolonged and targeted cyberattack.
