Cybersecurity Awareness Month
Across
- 3. weakness of an asset or control that can be exploited by threats
- 4. attempt to destroy, expose, alter, disable, steal, or gain unauthorized use of an asset
- 5. a software program that monitors for known examples of malicious code and then attempts to remove or quarantine it
Down
- 1. a network security tool that monitors and filters incoming and outgoing network traffic
- 2. provision of assurance that a claimed characteristic of an entity is correct