Across
- 3. The process of identifying, evaluating, and prioritizing risks to organizational assets.
- 6. Protection of devices like laptops, desktops, and mobile phones from cyber threats.
- 7. Determines what an authenticated user is allowed to do within a system.
- 8. is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
- 9. A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- 10. A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
Down
- 1. Routine practices and steps users take to maintain system health and improve security.
- 2. A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- 4. Manipulating people into divulging confidential information or performing actions that compromise security.
- 5. Mechanisms that restrict access to systems, data, and resources based on user roles and permissions.
