Cyber security - 1

1234567891011121314
Across
  1. 2. Mechanisms that restrict access to systems and data.
  2. 3. surface, The sum of all the points in a system that are exposed to an attacker.
  3. 4. A security measure where a device is physically isolated from unsecured networks.
  4. 6. A prolonged and targeted cyberattack.
  5. 8. Becoming desensitized to frequent security alerts.
  6. 10. Verifying the identity of a user, device, or system.
  7. 11. Granting access to resources based on identity and permissions.
  8. 12. Blocking known harmful software or processes.
  9. 14. Ensuring that authorized users have access to information and systems when needed.
Down
  1. 1. Trying many combinations to guess a password or encryption key.
  2. 5. A program where organizations reward individuals for finding vulnerabilities.
  3. 7. A network of infected computers controlled remotely.
  4. 9. Software that detects and removes malicious software.
  5. 11. Encryption using a pair of keys – one public and one private.
  6. 13. An entity that issues digital certificates.