Lock & Key: An Information Security Challenge 3

12345678910
Across
  1. 1. Software designed to detect and remove malicious programs.
  2. 4. Following rules, regulations, and standards in cybersecurity.
  3. 7. Manipulating people into giving up confidential information.
  4. 9. The practice of protecting systems, networks, and data from digital threats.
  5. 10. Protecting data and systems hosted on remote servers.
Down
  1. 2. A sneaky way to steal information by watching someone type their password.
  2. 3. Ensuring data is accurate and has not been tampered with.
  3. 5. An unexpected event that compromises the integrity or availability of data.
  4. 6. A type of malicious software that can replicate and spread.
  5. 8. A formal review of systems and processes to ensure security and compliance.