Across
- 4. A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
- 10. A decoy system or network that serves to attract potential attackers.
- 11. A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
- 12. Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
- 13. Locks the computer or data and demands a payment to release the machine.
- 15. identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
- 1. The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
- 2. A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
- 3. A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
- 5. A process that ensures and confirms a user’s identity.
- 6. A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
- 7. A type of surveillance software that records keystrokes made by a user
- 8. Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
- 9. Spread to other machines on a network.Red : A color
- 14. A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.
