1 13
2 16
3
4
5
6
12
7
8
14
15
9
10
11

Crossword: Network Security

Across

1. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.

2. Elevated permissions granted to specific users, allowing greater control over systems and data within an organization.

3. The process of filtering and validating user input before using it in an application.

4. Mechanisms that restrict user or device entry to specific resources or areas within a network.

5. The process of verifying the identity of a user before granting access to systems or data.

6. The process of securely sharing cryptographic keys between parties to enable encrypted communication.

7. The frequency at which safe programs are incorrectly flagged as malicious by a security system.

8. Flaws or weaknesses in the source code that could be exploited by attackers.

9. A fraudulent site created to mimic a legitimate platform.

10. A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.

11. Individuals or groups who control and manage botnets of infected devices.

Down

12. The process of gathering information about a system or network to identify vulnerabilities and weaknesses.

13. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.

14. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.

15. The process of converting ciphertext into plaintext using a decryption algorithm and a key.

16. The originating IP address or range from which traffic is allowed or denied.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓