CYBERSECURITY TOOLS AND TECHNIQUES

12345678910
Across
  1. 4. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
  2. 6. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
  3. 8. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
  4. 9. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
  5. 10. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
  1. 1. A system that monitors network or system activities for signs of malicious activities or policy violations.
  2. 2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
  3. 3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
  4. 5. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
  5. 7. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.