Cybersecurity

1234567
Across
  1. 1. A security protocol that ensures data integrity
  2. 3. A type of attack that floods a network with traffic
  3. 5. Method of verifying a user's identity
  4. 7. A system's first line of defense
Down
  1. 2. A piece of information used to access an account
  2. 4. A common social engineering tactic
  3. 5. A set of rules that filters network traffic
  4. 6. A program that appears legitimate but is malicious