Cyber security - 1

12345678910111213141516171819202122232425262728
Across
  1. 2. Granting access to resources based on identity and permissions.
  2. 3. Tools that monitor end-user devices to detect and respond to threats.
  3. 7. Blocking known harmful software or processes.
  4. 11. A program where organizations reward individuals for finding vulnerabilities.
  5. 15. An incident in which sensitive data is accessed without authorization.
  6. 16. Strategies and tools to prevent unauthorized data transfer or access.
  7. 17. Mechanisms that restrict access to systems and data.
  8. 22. Encryption using a pair of keys – one public and one private.
  9. 23. Becoming desensitized to frequent security alerts.
  10. 25. A modern security approach that provides integrated security across distributed systems.
  11. 26. A form of public key encryption based on elliptic curves.
  12. 28. A method or code that takes advantage of a vulnerability.
Down
  1. 1. A cryptographic technique for verifying the authenticity of digital messages.
  2. 4. An attack that floods a system with traffic to make it unavailable.
  3. 5. A network of infected computers controlled remotely.
  4. 6. An entity that issues digital certificates.
  5. 7. Trying many combinations to guess a password or encryption key.
  6. 8. A framework for developing, implementing, and monitoring IT governance.
  7. 9. Ensuring that information is accessible only to those authorized to have access.
  8. 10. Software used to collect, preserve, and analyze digital evidence.
  9. 12. The sum of all the points in a system that are exposed to an attacker.
  10. 13. Ensuring that authorized users have access to information and systems when needed.
  11. 14. Software that detects and removes malicious software.
  12. 17. Verifying the identity of a user, device, or system.
  13. 18. Routine practices for maintaining system health and improving security.
  14. 19. Documentation of who handled evidence and when.
  15. 20. Part of the internet not indexed by standard search engines and often used for illegal activity.
  16. 21. A security measure where a device is physically isolated from unsecured networks.
  17. 24. An attack that injects malicious scripts into content viewed by users.
  18. 27. A prolonged and targeted cyberattack.