Cybersecurity Fundamental Chapter 8 Part 1

12345678910
Across
  1. 3. Security professionals who simulate cyberattacks on systems to identify vulnerabilities.
  2. 6. Includes all hardware devices such as desktops, laptops, tablets, and smartphones connected to the network, which are vulnerable to various security threats.
  3. 7. Experts who monitor and analyze security measures to protect an organization's information systems.
  4. 8. Services hosted by cloud providers, including SaaS, PaaS, and IaaS, where organizations must protect their resources within the cloud environment.
  5. 9. Programs aimed at educating users about security policies, risks, and best practices to mitigate threats.
  6. 10. A network domain consisting of interconnected devices within a limited area, requiring strong security measures to protect against unauthorized access and data breaches.
Down
  1. 1. The study of ethical issues and the impact of computer technology on individuals and society.
  2. 2. The realm encompassing all users accessing an organization's information system, often considered the weakest link in security.
  3. 4. Legislation and regulations that govern the behavior and measures required to protect information and information systems.
  4. 5. Refers to private cloud services and infrastructure accessible to an organization via the internet, posing threats like unauthorized access and network probing.