Across
- 2. the process of identifying and fixing vulnerabilities on a system.
- 5. The smallest unit of information storage.
- 6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 8. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
- 9. A list of entities that are considered trustworthy and are granted access or privileges.
- 10. Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- 14. A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
- 17. Whom someone or what something is.
- 18. the process of protecting electrical devices and networks from attacks.
Down
- 1. A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
- 3. A term to describe connecting multiple separate networks together.
- 4. The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
- 7. An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
- 8. A list of entities that are blocked or denied privileges.
- 11. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
- 12. A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
- 13. A cryptographic algorithm for encryption and decryption.
- 15. A connection between two devices.
- 16. A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
