Cybersecurity crossword

123456
Across
  1. 2. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. 4. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. 6. Find a synonym of preempt
Down
  1. 1. What is the naming convention for ecrime category ?
  2. 2. What is 84 minutes the average time for ?
  3. 3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. 5. Which type of accounts are mainly targeted by adversaries ?