Cyber security - 6

123456789101112131415
Across
  1. 5. A potential cause of an unwanted incident that may result in harm.
  2. 6. A standard for managing customer data based on five trust service principles.
  3. 9. Proactively searching for signs of malicious activity.
  4. 10. A solution that collects and analyzes security data in real time.
  5. 11. An attack that manipulates a database query through input fields.
  6. 12. Protocols for securing communications over a network.
  7. 15. Encryption using the same key for both encryption and decryption.
Down
  1. 1. Information about threats and threat actors used to inform decisions.
  2. 2. Manipulating people into divulging confidential information.
  3. 3. A service that encrypts your internet connection for privacy and security.
  4. 4. A standard for message logging in a network.
  5. 7. A security process requiring two different forms of identification.
  6. 8. Replacing sensitive data with unique identification symbols.
  7. 13. A targeted phishing attack aimed at a specific individual or organization.
  8. 14. A physical or digital device used to authenticate identity.