Across
- 3. Should be strong and have MFA
- 6. Protects against viruses and worms
- 7. This will protect a device/networks ports
- 8. This is used to attract cyber attacks
- 9. Used to record activity and find source of intrusions
- 10. What to do to USB ports to prevent data exfiltration
- 11. An update with a fix for a vulnerability
Down
- 1. Can give false positives that distract administrator (acronym)
- 2. These should be restricted to prevent users from having more access than required
- 4. Teaches staff how to prevent falling for phishing scams
- 5. Makes data unreadable
- 10. Best defence against ransomware
