tech
Across
- 2. (Anything an organization possesses that needs protection)
- 3. (A security device that controls network traffic)
- 6. (A key 'P' in the cybersecurity framework)
- 8. (A computing system hosted online)
- 9. (To watch network activity and traffic)
- 10. (A software update to repair bugs or vulnerabilities)
- 14. (A deception tool to detect an attack)
- 15. (Network communication endpoints)
Down
- 1. (Bad software installed on a computer)
- 4. (A self-replicating malware program)
- 5. (Relates to system processes and authentication)
- 7. (Protecting data by converting it into secret code)
- 11. (Unauthorized user with malicious intent)
- 12. (A server that sits between a computer and the web to hide an IP address)
- 13. (A notification that an attack or vulnerability has been detected)