Across
- 3. A network security device that monitors and controls incoming and outgoing network traffic.
- 5. A security technology that monitors network traffic for suspicious activities or behavior.
- 7. Control The practice of limiting and controlling who can access and use resources in a system or network.
- 9. Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data.
- 10. Segmentation The practice of dividing a network into smaller, isolated segments to enhance security and control access.
Down
- 1. An attack that targets a vulnerability unknown to the software vendor, giving them zero days to fix it before it can be exploited.
- 2. A security method that requires users to provide two forms of identification, typically a password and a unique code.
- 4. The process of converting information into a secure code to prevent unauthorized access.
- 5. A security technology that actively monitors and blocks malicious activities in a network.
- 6. Manipulating individuals to divulge sensitive information or perform actions that may compromise security.
- 8. A secure network connection that allows users to access a private network over the internet.
