Network and Infrastructure Security (Medium)

12345678910
Across
  1. 3. A network security device that monitors and controls incoming and outgoing network traffic.
  2. 5. A security technology that monitors network traffic for suspicious activities or behavior.
  3. 7. Control The practice of limiting and controlling who can access and use resources in a system or network.
  4. 9. Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data.
  5. 10. Segmentation The practice of dividing a network into smaller, isolated segments to enhance security and control access.
Down
  1. 1. An attack that targets a vulnerability unknown to the software vendor, giving them zero days to fix it before it can be exploited.
  2. 2. A security method that requires users to provide two forms of identification, typically a password and a unique code.
  3. 4. The process of converting information into a secure code to prevent unauthorized access.
  4. 5. A security technology that actively monitors and blocks malicious activities in a network.
  5. 6. Manipulating individuals to divulge sensitive information or perform actions that may compromise security.
  6. 8. A secure network connection that allows users to access a private network over the internet.