Across
- 2. A system designed to both detect and prevent malicious network traffic
- 4. A method of tricking individuals into revealing personal information by pretending to be a trusted entity
- 6. A technique used to modify network addresses as packets pass through a router
- 7. A server that acts as an intermediary between the user and the internet to enhance privacy
- 9. A security system designed to block unauthorized access to a network or computer system
- 10. Software designed to harm or exploit any device, service, or network
- 12. The act of altering the appearance of a website, often as part of a cyber attack
- 13. A type of attack where data exceeds a buffer’s limit, potentially allowing code execution (hyphenated two-piece word)
- 15. A firewall configuration where only authorized services are exposed to the internet
- 16. A system that monitors network traffic for suspicious activity and raises alerts
- 20. A detection method that identifies behavior outside of predefined patterns (hyphenated two-piece word)
- 21. A type of worm that specifically targeted Microsoft IIS web servers
- 22. A buffer zone between a private network and the internet that hosts public-facing services
- 25. A security measure that restricts users' access to certain network resources based on their identity (hyphenated two-piece word)
- 26. The process of identifying unauthorized access to a network or system (hyphenated two-piece word)
- 29. A manipulation technique where attackers exploit human psychology to gain unauthorized access (hyphenated two-piece word)
Down
- 1. An IDS that monitors network traffic for unusual patterns
- 3. Type of IDS that detects known threats based on predefined patterns (hyphenated two-piece word)
- 5. A security architecture that uses two firewalls to protect the internal network (hyphenated two-piece word)
- 7. A tool used to capture and analyze network traffic in real-time (hyphenated two-piece word)
- 8. Technology that checks the state of active connections before deciding which packets to allow (hyphenated two-piece word)
- 11. A firewall designed to protect web applications from security threats by filtering traffic
- 14. A type of malicious software that locks a computer or data until a ransom is paid
- 17. An attack method used to gain unauthorized access by guessing or cracking passwords (hyphenated two-piece word)
- 18. An attack that disrupts the normal functioning of a server or network by overwhelming it with traffic (hyphenated two-piece word)
- 19. A server that hosts websites and delivers web pages to users' browsers (hyphenated two-piece word)
- 23. The process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized users can decipher it
- 24. A secure method for connecting to a network from a remote location
- 27. Malicious software that allows hackers to gain administrative access while hiding its presence
- 28. A type of IDS that monitors activity on a single host or system
