Cybersecurity 701 Unit 5

1234567891011121314
Across
  1. 3. A systematic examination of security controls and configurations to identify issues and ensure compliance.
  2. 5. A validation method that uses vulnerability scanning tools again to check the effectiveness of previous remediation efforts
  3. 6. A remediation action that involves dividing a network into smaller, isolated sections to contain threats.
  4. 10. A single virtual or physical host that is configured to appear vulnerable and/or attractive to potential attackers to lure them in
  5. 12. A network composed of multiple deception hosts, which is more difficult for attackers to detect.
  6. 14. A method of ensuring application security by analyzing source code or binary code without executing the application
Down
  1. 1. The initial phase of a penetration test involving intelligence gathering on the target system or network
  2. 2. The method of isolating or restricting access to compromised or suspicious systems or data to contain and limit the impact of a security incident.
  3. 4. A cybersecurity practice that involves simulating cyberattacks to proactively identify vulnerabilities in a system.
  4. 7. A bait file intended to be accessed by malicious actors, which sends an alarm and indicates unauthorized activity in a system
  5. 8. The abbreviation for tools designed to prevent unauthorized access, use, or transmission of sensitive data.
  6. 9. The abbreviation for a comprehensive solution that centralizes log and event data to quickly respond to incidents
  7. 11. Fictitious words or records added to legitimate databases whose presence indicates stolen data, serving as a passive detection method.
  8. 13. A network protocol that collects IP traffic flow information for analysis and monitoring to provide insight into network traffic patterns.