Across
- 4. This is a popular network protocol analyzer, or an application that captures packets from a network connection.
- 5. This is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
Down
- 1. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
- 2. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
- 3. 95% of all firewalls fail due to this