Final Crossword

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
Across
  1. 4. A network device that can forward packets across different computer networks
  2. 7. small number of passwords used when trying several different user accounts
  3. 8. tool that provides a visual representation of the wireless signal
  4. 12. A framework for transporting authentication protocols
  5. 15. Having a high tolerance for risk
  6. 16. A device that distributes resources and services to devices connected to the network
  7. 22. An access control scheme that is the most restrictive
  8. 25. A downgrade attack
  9. 26. A systematic approach to dealing with transformations within an organization
  10. 27. The retrieval of difficult-to-obtain data
  11. 32. Threat intelligence data that has been legally gathered
  12. 34. denial of the truth or validity of something
  13. 35. Vulnerability for which there are no days of advanced warning
  14. 36. Employee choose from company-approved devices
  15. 38. Redirecting users to fake websites to steal data
  16. 39. Installing software security updates
  17. 41. replaces SSL
  18. 43. A standard of normal activities
  19. 44. A device that distributes work across a network
  20. 49. Infecting frequented websites with malware
  21. 50. bogus requests to overwhelm the recipient
  22. 51. Addressing a risk by making the risk less serious
  23. 52. Unnecessary ports that are not disabled
  24. 54. A product that consolidates real-time security monitoring and management
  25. 56. pay security researchers who uncover security bugs
  26. 57. Using more than one type of authentication credential
  27. 58. An AP set up by an attacker to mimic an authorized AP
  28. 59. An attack in which threat actors introduce something into RAM
  29. 60. retains historical documents
Down
  1. 1. ensure critical data is protected
  2. 2. server within the DMZ that is used to connect two dissimilar security zones
  3. 3. Taking a “picture” of the state of the data repeatedly
  4. 5. software embedded into hardware
  5. 6. Isolating systems that have been compromised
  6. 9. Simplifies the process of building, deploying, and managing containerized applications
  7. 10. A device that maintains power to equipment in case of an interruption
  8. 11. An certificate that uses an asterisk to cover multiple subdomains
  9. 13. evidence or proof of something
  10. 14. VM breaking out to interact with host OS
  11. 17. Directly probing for vulnerabilities
  12. 18. is a finite sequence of rigorous instructions
  13. 19. A creative invention or work with rights
  14. 20. digital fingerprints
  15. 21. refers to integrating security into the application
  16. 23. Combining two or more devices to appear as a single unit
  17. 24. Numeric scores on a vulnerability
  18. 28. captures and stores each keystroke that a user types on the computer’s keyboard
  19. 29. The state or fact of something being likely or possible
  20. 30. Tools that allow a device to be managed remotely by an organization
  21. 31. A protocol suite for securing Internet Protocol (IP) communications
  22. 33. use of technology without the knowledge of the official IT department
  23. 37. A coding technique for accounting for errors
  24. 40. An incident response testing exercise that is a monthly 30-minute discussion
  25. 42. threat actor gains illicit access of elevated rights or privileges
  26. 44. enables users to access a network resource through a directory service
  27. 45. unauthorized copying of data
  28. 46. Intentionally flooding the radio frequency spectrum
  29. 47. Having little tolerance for risk
  30. 48. isolate the failure of a server and storage resources from cloud users
  31. 53. Procedures needed if a “roll back”
  32. 55. Converting data into unreadable form for security