Across
- 4. Applying updates to fix software flaws.
- 5. Method of guessing passwords by trying all possibilities.
- 7. Security barrier that controls network traffic flow.
- 9. Isolated environment to safely run suspicious files.
- 10. System for analyzing and correlating security events.
Down
- 1. Period of active connection between a user and a system.
- 2. Technology that prevents sensitive data from leaving a network.
- 3. Authorized simulated cyberattack to test security defenses.
- 6. Algorithm for encrypting and decrypting information.
- 8. Recorded events and activities on a system or network.
