Cybersecurity Crossword

12345678
Across
  1. 4. Measures adopted to protect systems and data from cyber threats.
  2. 5. A network-connected computer or device.
  3. 6. A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
  4. 8. The process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. 1. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. 2. A powerful tool used for penetration testing, security research, and IDS signature development.
  3. 3. The process or action of verifying the identity of a user or process.
  4. 7. A country in Europe known for its precision engineering and historical contributions to science and technology.