Across
- 1. An emulation of a computer system that provides the functionality of a physical computer.
- 7. The on-demand delivery of IT resources over the internet with pay-as-you-go pricing.
- 11. An Intermediary server that separates end users from the websites they browse, often used to hide internal IP addresses.
- 12. A system that monitors network traffic for suspicious activity and issues alerts, but does not move to block it automatically.
- 14. The software that supports a computer's basic functions, such as scheduling tasks and executing applications.
Down
- 1. The process of creating a software-based representation of something, such as virtual applications, servers, or networks.
- 2. An open-source Operating System frequently used in cybersecurity for penetration testing and server management.
- 3. Any physical device within a network of other devices that’s able to send, receive, or forward information (e.g., a computer or router).
- 4. A global network of servers acting as a single ecosystem, commonly used for storage or computing power.
- 5. A decoy system or network trap designed to lure in potential attackers to study their methods.
- 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 8. A network security tool that monitors a network for malicious activity and takes active steps to block or prevent it.
- 9. Software, firmware, or hardware that creates and runs Virtual Machines.
- 10. The physical path or transmission material used to carry data signals across a network (e.g., fiber optic, copper wire, or radio waves).
- 13. A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually the internet.
