Cyber security crossword

12345678910
Across
  1. 1. : Strengthening security configurations of systems
  2. 6. : Approved list of trusted entities or applications
  3. 7. : Formal examination of security policies and systems
  4. 8. : Decoy network set up to detect unauthorized access
  5. 10. : Using multiple backup systems to prevent failure
Down
  1. 2. : Separating systems to prevent security breaches
  2. 3. : Simulating software or hardware to test security
  3. 4. : Making data intentionally difficult to interpret
  4. 5. : Gaining higher privileges within a system
  5. 9. : Ensuring data remains accurate and unaltered