OT cybersecurity

123456789
Across
  1. 2. A system that monitors and controls industrial processes
  2. 4. An unauthorized act of bypassing security mechanisms
  3. 6. A secret word or phrase used to authenticate access
  4. 8. A security flaw that can be exploited
  5. 9. Protection of sensitive information from unauthorized access
Down
  1. 1. A unique identifier for a network device
  2. 3. The practice of securing computer systems and networks
  3. 5. An act of gaining unauthorized access to systems and networks
  4. 6. A device used to control the flow of electricity in OT systems
  5. 7. A network security system that monitors and controls incoming and outgoing network traffic