Across
- 4. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
- 6. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
- 8. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
- 9. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
- 10. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
- 1. A system that monitors network or system activities for signs of malicious activities or policy violations.
- 2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
- 3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
- 5. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
- 7. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.
