Across
- 2. Mechanisms that restrict access to systems and data.
- 3. surface, The sum of all the points in a system that are exposed to an attacker.
- 4. A security measure where a device is physically isolated from unsecured networks.
- 6. A prolonged and targeted cyberattack.
- 8. Becoming desensitized to frequent security alerts.
- 10. Verifying the identity of a user, device, or system.
- 11. Granting access to resources based on identity and permissions.
- 12. Blocking known harmful software or processes.
- 14. Ensuring that authorized users have access to information and systems when needed.
Down
- 1. Trying many combinations to guess a password or encryption key.
- 5. A program where organizations reward individuals for finding vulnerabilities.
- 7. A network of infected computers controlled remotely.
- 9. Software that detects and removes malicious software.
- 11. Encryption using a pair of keys – one public and one private.
- 13. An entity that issues digital certificates.
