Cybersecurity Week 4

12345
Across
  1. 4. This is a popular network protocol analyzer, or an application that captures packets from a network connection.
  2. 5. This is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
Down
  1. 1. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
  2. 2. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
  3. 3. 95% of all firewalls fail due to this