CyberDSA D2

12345678910
Across
  1. 2. Encrypted network connection over the internet for secure communication.
  2. 6. Software that secretly collects user information.
  3. 8. Security Operations Center that monitors and responds to threats.
  4. 9. Process of verifying the identity of a user or system.
  5. 10. Copy of data kept for recovery in case of loss.
Down
  1. 1. Process of converting data into a secure, unreadable format.
  2. 3. Secret string used to authenticate a user.
  3. 4. Software update designed to fix security vulnerabilities.
  4. 5. Network security device that filters incoming and outgoing traffic.
  5. 7. Malicious program that can copy itself and infect systems.