Across
- 2. A type of attack that tricks a user into revealing their personal information is called
- 3. What is the term for a weakness in a system's security that could be exploited by a threat?
- 5. Popular IDS used to check malicious activity in network company.
Down
- 1. What is the term for the process of validating the identity of a user or system? INJECTION SQL is a type of attack that attempts to exploit a vulnerability in a web application.
- 4. A L2 device that is used to connect multiple systems within a network.
