Cyber Security Tools and Techniques

12345678
Across
  1. 3. A software that detects and removes malicious programs.
  2. 5. A method used to make passwords difficult to crack.
  3. 6. A security measure used to verify user identity.
  4. 8. A software that monitors network traffic for suspicious activity
Down
  1. 1. A security device that acts as an intermediary for web access.
  2. 2. A security tool that filters incoming and outgoing network traffic.
  3. 4. A method of disguising internet activity to avoid detection.
  4. 7. A tool used to crack passwords using brute force attacks.