Cybersecurity Awareness Month

12345
Across
  1. 3. weakness of an asset or control that can be exploited by threats
  2. 4. attempt to destroy, expose, alter, disable, steal, or gain unauthorized use of an asset
  3. 5. a software program that monitors for known examples of malicious code and then attempts to remove or quarantine it
Down
  1. 1. a network security tool that monitors and filters incoming and outgoing network traffic
  2. 2. provision of assurance that a claimed characteristic of an entity is correct