Across
- 4. A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
- 5. A device that monitors, logs, detects, and reacts to stop or prevent security breaches
- 7. a type of IDS that uses behavior for decision making
- 9. hardware firewall that protects the entire network
- 10. combines several layers of security and networking services into one solution
- 12. A buffer network that sits between the private network and an untrusted network
Down
- 1. the main benefit of an ACL
- 2. a type of IDS that uses patterns for decision making
- 3. the type of computer that may be found inside a screened subnet
- 6. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules
- 8. software firewall that protects a single device
- 11. Firewalls use filtering rules, which are sometimes called access control lists, to identify allowed and blocked traffic.