Across
- 2. The outer boundary of a network, often protected by firewalls and other security measures.
- 4. Authentication based on unique physical or behavioral traits
- 6. A self-replicating malware that spreads across networks.
- 8. A decoy system designed to attract and detect cyber-attacks.
- 10. Security Operations Center, a centralized unit for monitoring and managing security
- 14. The process of converting data into a code to prevent unauthorized access.
- 16. Weakness in a system that can be exploited by attackers.
- 18. The process of converting input data into a fixed-size string of characters, often used for data integrity.
- 20. Distributed Denial of Service, a cyber-attack that overwhelms a system with traffic.
Down
- 1. The device or node where a network connection is terminated.
- 3. Malicious software that encrypts data and demands a payment for its release
- 5. Software designed to harm or exploit computer systems.
- 7. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity.
- 9. A software update designed to fix vulnerabilities or improve functionality.
- 11. A technology that ensures secure communication over an untrusted network
- 12. This network security device acts as a barrier to block unauthorized access.
- 13. Unauthorized interception of network traffic to capture and analyze data.
- 15. A systematic examination of security measures to identify vulnerabilities.
- 17. A security event that compromises the confidentiality, integrity, or availability of data.
- 19. Faking the source of network packets to deceive a system
