Across
- 4. A network device that can forward packets across different computer networks
- 7. small number of passwords used when trying several different user accounts
- 8. tool that provides a visual representation of the wireless signal
- 12. A framework for transporting authentication protocols
- 15. Having a high tolerance for risk
- 16. A device that distributes resources and services to devices connected to the network
- 22. An access control scheme that is the most restrictive
- 25. A downgrade attack
- 26. A systematic approach to dealing with transformations within an organization
- 27. The retrieval of difficult-to-obtain data
- 32. Threat intelligence data that has been legally gathered
- 34. denial of the truth or validity of something
- 35. Vulnerability for which there are no days of advanced warning
- 36. Employee choose from company-approved devices
- 38. Redirecting users to fake websites to steal data
- 39. Installing software security updates
- 41. replaces SSL
- 43. A standard of normal activities
- 44. A device that distributes work across a network
- 49. Infecting frequented websites with malware
- 50. bogus requests to overwhelm the recipient
- 51. Addressing a risk by making the risk less serious
- 52. Unnecessary ports that are not disabled
- 54. A product that consolidates real-time security monitoring and management
- 56. pay security researchers who uncover security bugs
- 57. Using more than one type of authentication credential
- 58. An AP set up by an attacker to mimic an authorized AP
- 59. An attack in which threat actors introduce something into RAM
- 60. retains historical documents
Down
- 1. ensure critical data is protected
- 2. server within the DMZ that is used to connect two dissimilar security zones
- 3. Taking a “picture” of the state of the data repeatedly
- 5. software embedded into hardware
- 6. Isolating systems that have been compromised
- 9. Simplifies the process of building, deploying, and managing containerized applications
- 10. A device that maintains power to equipment in case of an interruption
- 11. An certificate that uses an asterisk to cover multiple subdomains
- 13. evidence or proof of something
- 14. VM breaking out to interact with host OS
- 17. Directly probing for vulnerabilities
- 18. is a finite sequence of rigorous instructions
- 19. A creative invention or work with rights
- 20. digital fingerprints
- 21. refers to integrating security into the application
- 23. Combining two or more devices to appear as a single unit
- 24. Numeric scores on a vulnerability
- 28. captures and stores each keystroke that a user types on the computer’s keyboard
- 29. The state or fact of something being likely or possible
- 30. Tools that allow a device to be managed remotely by an organization
- 31. A protocol suite for securing Internet Protocol (IP) communications
- 33. use of technology without the knowledge of the official IT department
- 37. A coding technique for accounting for errors
- 40. An incident response testing exercise that is a monthly 30-minute discussion
- 42. threat actor gains illicit access of elevated rights or privileges
- 44. enables users to access a network resource through a directory service
- 45. unauthorized copying of data
- 46. Intentionally flooding the radio frequency spectrum
- 47. Having little tolerance for risk
- 48. isolate the failure of a server and storage resources from cloud users
- 53. Procedures needed if a “roll back”
- 55. Converting data into unreadable form for security
