Cybersecurity Awareness Month - Acronym Edition

1234567
Across
  1. 2. An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
  2. 4. A system turns domain names into IP addresses
  3. 5. A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
  4. 7. Also called a "black cloud"
Down
  1. 1. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
  2. 3. A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
  3. 4. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
  4. 6. Provide outsourced monitoring and management of security devices and systems