Across
- 5. A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- 7. Security intended to protect devices like laptops, desktops, and mobile phones.
- 9. Routine practices and steps users take to maintain system health and improve security.
- 10. A Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
Down
- 1. The process of identifying, evaluating, and prioritizing risks to organizational assets.
- 2. Mechanisms that restrict access to systems, data, and resources.
- 3. Manipulating people into divulging confidential information or performing actions that compromise security.
- 4. A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
- 6. A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- 8. Determines what an authenticated user is allowed to do within a system.
