Across
- 2. itelligence exhibited by machines, particularly computer systems.
- 3. one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- 6. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- 7. "gift" or "present" in Arabic.
- 8. a team of experts that proactively monitor and respond to cybersecurity incidents.
- 9. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- 1. the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- 4. an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- 5. a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- 7. a technique through which a cybercriminal disguises themselves as a known or trusted source.