Across
- 2. Exploiting a bug or vulnerability to gain elevated access rights.
- 4. A network protocol for collecting IP traffic information.
- 6. A framework for managing digital keys and certificates.
- 8. A server that acts as an intermediary for requests from clients.
- 9. Reviewing logs to detect suspicious or unauthorized activities.
- 11. An attack where the attacker secretly intercepts communication between two parties.
- 13. A system that actively blocks detected threats.
- 14. A system that monitors and controls incoming and outgoing network traffic.
- 16. Software designed to cause damage or unauthorized actions.
- 17. A security risk originating from within the organization.
- 18. A set of procedures for identifying and handling security incidents.
- 19. Actions taken after gaining access, like data extraction.
- 22. Software or hardware that detects unauthorized access or anomalies.
- 23. Taking advantage of vulnerabilities to gain access.
- 25. Strategies to detect and prevent threats from within the organization.
- 27. Guaranteeing the accuracy and completeness of data.
- 28. A software update designed to fix vulnerabilities or bugs.
- 29. Controlling network access using device MAC addresses.
- 30. Sending IP packets with a false source IP address.
Down
- 1. A framework for developing and executing exploit code.
- 3. Dividing a network into segments to improve security.
- 5. Preventing parties from denying their actions or commitments.
- 7. The process of applying updates to software to fix vulnerabilities.
- 10. A function that converts data into a fixed-size string of characters.
- 12. Creating an exact copy of a digital device for investigation.
- 15. scanning, Checking for open ports to identify services running on a system.
- 20. A European regulation on data protection and privacy.
- 21. The process of sharing cryptographic keys securely.
- 24. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 26. A tool that captures and analyzes network traffic.
