Cybersecurity

123456789
Across
  1. 1. A string of characters that allows access to a computer system or service.
  2. 4. Before an application goes live, it needs to go through a security ___.
  3. 6. Process of updating to address security vulnerabilities.
  4. 7. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. 9. SIEM tool from IBM.
Down
  1. 1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. 2. We are all cyber ___.
  3. 3. Used in cryptography to prove authenticity of a device, server, or user.
  4. 5. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. 8. Linux distro used for ethical hacking.