Security Crossword

1234567891011121314151617181920
Across
  1. 4. The process of managing updates for software applications and technologies.
  2. 5. Intermediary server for network requests.
  3. 8. Unauthorized data access incident.
  4. 9. A firewall that monitors and filters traffic between a web application and the internet.
  5. 13. Attempt to obtain sensitive information.
  6. 15. Testing a system for vulnerabilities by simulating attacks.
  7. 16. Algorithm for performing encryption or decryption.
  8. 18. A collection of tools used by an attacker to maintain access to a system while hiding their presence.
  9. 20. Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
  1. 1. Measures taken to protect the integrity and usability of networks.
  2. 2. Running programs in a controlled environment to prevent them from affecting the host system.
  3. 3. A formal document outlining how security measures are implemented within an organization.
  4. 6. Protection measures applied to end-user devices like computers and mobile devices.
  5. 7. A framework for managing digital certificates and public-key encryption.
  6. 10. A systematic evaluation of the security of a company’s information system.
  7. 11. An entity that issues digital certificates for secure communications.
  8. 12. Protocol for establishing an encrypted link between a server and a client.
  9. 14. Permissions granted to users regarding what they can do with resources on a system.
  10. 17. A type of malware that replicates itself to spread to other computers without user intervention.
  11. 19. Software that secretly collects user information.