Across
- 2. An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
- 4. A system turns domain names into IP addresses
- 5. A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
- 7. Also called a "black cloud"
Down
- 1. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
- 3. A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
- 4. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
- 6. Provide outsourced monitoring and management of security devices and systems