Cyber security - 4

1234567891011121314
Across
  1. 1. A tool that captures and analyzes network traffic.
  2. 2. Actions taken after gaining access, like data extraction.
  3. 3. A server that acts as an intermediary for requests from clients.
  4. 7. A network protocol for collecting IP traffic information.
  5. 8. A software update designed to fix vulnerabilities or bugs.
  6. 10. Preventing parties from denying their actions or commitments.
  7. 11. Dividing a network into segments to improve security.
  8. 12. Software designed to cause damage or unauthorized actions.
  9. 13. A framework for developing and executing exploit code.
  10. 14. scanning, Checking for open ports to identify services running on a system.
Down
  1. 1. Exploiting a bug or vulnerability to gain elevated access rights.
  2. 4. A framework for managing digital keys and certificates.
  3. 5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  4. 6. The process of applying updates to software to fix vulnerabilities.
  5. 9. An attack where the attacker secretly intercepts communication between two parties.