Cybersecurity
Across
- 1. A security protocol that ensures data integrity
- 3. A type of attack that floods a network with traffic
- 5. Method of verifying a user's identity
- 7. A system's first line of defense
Down
- 2. A piece of information used to access an account
- 4. A common social engineering tactic
- 5. A set of rules that filters network traffic
- 6. A program that appears legitimate but is malicious