Cybersecurity Crossword

1234567891011121314
Across
  1. 2. Filters traffic on a network
  2. 3. Linux tool to encrypt and decrypt
  3. 8. Encryption that only uses a public and private key
  4. 11. A way of accessing a system remotely
  5. 12. Linux command to search a file for a string
  6. 13. I in CIA
  7. 14. Tricks people into making themselves vulnerable
Down
  1. 1. Stores files in itself
  2. 4. Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
  3. 5. Ethical hacking
  4. 6. Use of shifting characters to hide a message
  5. 7. Keeping information offsite for easy recovery
  6. 9. Malicious software
  7. 10. File that contains information about previous interactions with a system or network