Across
- 1. Virtual _________ Network
- 5. Malware which presents unwanted advertisements
- 7. A Weakness in a system
- 10. Application of investigative analysis on a computer
- 13. Should not be shared / kept open to anyone
- 15. Unplanned disruption or failure of a feature or service
- 16. _______ makes password / passphrase more secure
- 17. Confidentiality,___________,Availability
- 18. Threat X Vulnerability
- 19. ________ is created by hackers for unauthorized entry at any point of time..
Down
- 2. Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
- 3. A terminal emulator / serial console that support SSH
- 4. Web __________ Penetration Testing
- 6. A Network security device that monitors and filters incoming / outgoing network traffic
- 8. ___________ is stimuli that has meaning in some context for its receiver
- 9. The refusal of something requested or desired.
- 11. The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
- 12. Successfully exploiting vulnerability is known as
- 13. A fraudulent social engineering attempt to obtain sensitive information
- 14. Malicious software that replicates while moving across information systems
