Introduction to Cybersecurity

123456789101112
Across
  1. 4. is the act of skirting or breaking through security boundaries.
  2. 7. a type of hacker that is generally ethical and law-abiding.
  3. 8. focuses on keeping applications or programs secure throughout their lifecycle.
  4. 12. certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
  1. 1. is based on the key concepts of information assurance.
  2. 2. an attack in which the attacker is connectedto a network and monitors an authenticated session.
  3. 3. a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
  4. 5. Is the protection of digital devices and their connected networks from danger and threats.
  5. 6. a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
  6. 9. prevents and protects unauthorized intrusions into the network.
  7. 10. which is a set of security controls designed to protect payment account security.
  8. 11. includes threats such as viruses, worms, Trojan horses.