Across
- 3. The process of converting data into a code to prevent unauthorized access.
- 5. Detection A system or process that monitors network traffic for suspicious activity or policy violations.
- 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 7. Management The process of managing updates and patches to software to fix vulnerabilities or bugs.
- 9. The process of verifying the identity of a user or device, often using passwords or biometric data.
- 10. An incident in which unauthorized access or disclosure of sensitive data occurs.
Down
- 1. A weakness in a system or network that could be exploited by a threat to gain unauthorized access.
- 2. A type of malicious software that locks or encrypts data and demands payment for its release.
- 4. A type of cyberattack where fraudulent attempts are made to obtain sensitive information by disguising as a trustworthy entity.
- 8. Malicious software designed to harm or exploit any device or network.
