Cyber Security

1234567891011121314151617181920
Across
  1. 2. The outer boundary of a network, often protected by firewalls and other security measures.
  2. 4. Authentication based on unique physical or behavioral traits
  3. 6. A self-replicating malware that spreads across networks.
  4. 8. A decoy system designed to attract and detect cyber-attacks.
  5. 10. Security Operations Center, a centralized unit for monitoring and managing security
  6. 14. The process of converting data into a code to prevent unauthorized access.
  7. 16. Weakness in a system that can be exploited by attackers.
  8. 18. The process of converting input data into a fixed-size string of characters, often used for data integrity.
  9. 20. Distributed Denial of Service, a cyber-attack that overwhelms a system with traffic.
Down
  1. 1. The device or node where a network connection is terminated.
  2. 3. Malicious software that encrypts data and demands a payment for its release
  3. 5. Software designed to harm or exploit computer systems.
  4. 7. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity.
  5. 9. A software update designed to fix vulnerabilities or improve functionality.
  6. 11. A technology that ensures secure communication over an untrusted network
  7. 12. This network security device acts as a barrier to block unauthorized access.
  8. 13. Unauthorized interception of network traffic to capture and analyze data.
  9. 15. A systematic examination of security measures to identify vulnerabilities.
  10. 17. A security event that compromises the confidentiality, integrity, or availability of data.
  11. 19. Faking the source of network packets to deceive a system