Cyber Security #3

1234567
Across
  1. 1. electronic junk mailor junk newsgroup postings.
  2. 5. An adverse network event in an information system.
  3. 6. Process of identifying and fixing vulnerabilities on a system.
  4. 7. Process of updating software to a different version.
Down
  1. 2. information gathering and analysis of asseys to ensure such things as policy compliaance and security from vulnerabilities.
  2. 3. used to specify which packets will or will not be used. Also determine which packets get blocked.
  3. 4. Process of transforming an encrypted message into its original plaintext.