febr

12345678910
Across
  1. 2. Monitoring systems for suspicious activity in real-time
  2. 5. Attack using social engineering via email attachments
  3. 8. Policy requiring strong, unique passwords regularly changed
  4. 9. Fake app or update that steals banking credentials
  5. 10. Software scanning for and removing malware
Down
  1. 1. Encryption of data at rest to protect confidentiality
  2. 3. Network of compromised devices used for attacks
  3. 4. Unauthorized access to a system or account
  4. 6. Attack stealing session cookies to impersonate users
  5. 7. Malicious software that spreads by exploiting vulnerabilities