Across
- 4. the protection of internet-connected systems such as hardware, software and data from cyberthreats
- 5. engineering the term used for a broad range of malicious activities accomplished through human interactions.
- 6. testing an authorized simulated attack performed on a computer system to evaluate its security
- 7. category of malicious cyber-attacks that hackers or cybercriminals employ
- 8. information such as facts and numbers used to analyze something or make decisions
- 10. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- 1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
- 2. when attackers send malicious emails designed to trick people into falling for a scam
- 3. allow users to keep their software programs updated without having to check for and install available updates manually
- 9. software designed to interfere with a computer's normal functioning