Zscaler Crossword puzzle

12345678910111213141516171819202122
Across
  1. 4. (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
  2. 5. Software update that fixes security vulnerabilities or improves the functionality of a program.
  3. 8. (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
  4. 9. Weakness or flaw in a system that can be exploited by attackers.
  5. 12. Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
  6. 13. Secret combination of characters used to authenticate and gain access to a system or account.
  7. 15. Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
  8. 16. Software designed to detect, prevent, and remove malicious software from a computer system.
  9. 17. Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
  10. 18. Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
  11. 20. Manipulation of individuals to gain unauthorized access or sensitive information.
  12. 21. Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
  13. 22. Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. 1. Creates a connection over a public network, allowing users to access private networks remotely.
  2. 2. Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
  3. 3. Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
  4. 6. Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
  5. 7. Acts as a barrier between a trusted internal network and an untrusted external network.
  6. 10. Converts data into a format that can only be read or accessed with the correct decryption key.
  7. 11. Broad term for malicious software designed to harm or exploit computer systems.
  8. 14. Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
  9. 15. Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
  10. 19. Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.