Cybersecurity Applications
Across
- 4. An attacker might attempt to trick someone through manipulation or deception.
- 6. to prevent vulnerabilities and injection attacks.
- 8. determines what actions they are allowed to perform
- 10. The process of verifying the identity of a user or device
Down
- 1. Systems can detect and respond to potential security threats
- 2. An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
- 3. to regulate who can access what resources
- 5. to keep software and firmware updated to protect against known vulnerabilities
- 7. It is important to secure data
- 9. You must secure the actual, tangible devices.