Cyber Ethics-Cyber Security Awareness 2

12345
Across
  1. 2. A type of attack that tricks a user into revealing their personal information is called
  2. 3. What is the term for a weakness in a system's security that could be exploited by a threat?
  3. 5. Popular IDS used to check malicious activity in network company.
Down
  1. 1. What is the term for the process of validating the identity of a user or system? INJECTION SQL is a type of attack that attempts to exploit a vulnerability in a web application.
  2. 4. A L2 device that is used to connect multiple systems within a network.