Across
- 2. The process of distributing and applying updates to software to fix known vulnerabilities.
- 5. The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
- 9. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- 11. The process of addressing and managing the aftermath of a security breach or cyberattack.
- 12. Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
- 1. A proactive system that detects and prevents identified threats from infiltrating a network
- 3. The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
- 4. An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
- 6. Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
- 7. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- 8. A system that monitors network traffic for suspicious activity and potential threats
- 10. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.