Across
- 2. Tools for monitoring and analyzing network traffic
- 4. A mechanism for verifying user identity
- 7. A system for detecting abnormal network behavior
- 9. Protocol for encrypted data transmission
- 10. Technologies to prevent the spread of malicious software
Down
- 1. Technologies used to protect data transmission in networks
- 3. Practice of protecting computer networks from unauthorized access
- 5. A Strategy for Restricting Network Resource Access
- 6. Provide a secure channel for remote access to network devices
- 8. A device for detecting and blocking network attacks
