Cybersecurity Awarness - Security at Home

12345678910
Across
  1. 5. A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
  2. 7. Security intended to protect devices like laptops, desktops, and mobile phones.
  3. 9. Routine practices and steps users take to maintain system health and improve security.
  4. 10. A Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
Down
  1. 1. The process of identifying, evaluating, and prioritizing risks to organizational assets.
  2. 2. Mechanisms that restrict access to systems, data, and resources.
  3. 3. Manipulating people into divulging confidential information or performing actions that compromise security.
  4. 4. A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
  5. 6. A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
  6. 8. Determines what an authenticated user is allowed to do within a system.