1 10
8
2
11
3
4
9
5
6
7

Crossword: Protecting Systems

Across

1. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.

2. The process of dividing a computer network into smaller subnetworks for improved security and performance.

3. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.

4. A controlled attempt to exploit vulnerabilities in a network to assess its level of security.

5. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.

6. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.

7. Software designed to detect and remove malicious software, such as viruses, from computer systems.

Down

8. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.

9. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.

10. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.

11. A secure network connection that allows remote users to access a private network over the internet securely.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓