CyberDSA D2
Across
- 2. Encrypted network connection over the internet for secure communication.
- 6. Software that secretly collects user information.
- 8. Security Operations Center that monitors and responds to threats.
- 9. Process of verifying the identity of a user or system.
- 10. Copy of data kept for recovery in case of loss.
Down
- 1. Process of converting data into a secure, unreadable format.
- 3. Secret string used to authenticate a user.
- 4. Software update designed to fix security vulnerabilities.
- 5. Network security device that filters incoming and outgoing traffic.
- 7. Malicious program that can copy itself and infect systems.