tech

123456789101112131415
Across
  1. 2. (Anything an organization possesses that needs protection)
  2. 3. (A security device that controls network traffic)
  3. 6. (A key 'P' in the cybersecurity framework)
  4. 8. (A computing system hosted online)
  5. 9. (To watch network activity and traffic)
  6. 10. (A software update to repair bugs or vulnerabilities)
  7. 14. (A deception tool to detect an attack)
  8. 15. (Network communication endpoints)
Down
  1. 1. (Bad software installed on a computer)
  2. 4. (A self-replicating malware program)
  3. 5. (Relates to system processes and authentication)
  4. 7. (Protecting data by converting it into secret code)
  5. 11. (Unauthorized user with malicious intent)
  6. 12. (A server that sits between a computer and the web to hide an IP address)
  7. 13. (A notification that an attack or vulnerability has been detected)