Across
- 1. A string of characters that allows access to a computer system or service.
- 4. Before an application goes live, it needs to go through a security ___.
- 6. Process of updating to address security vulnerabilities.
- 7. If a cyber attack is suspected, it should be reported to the ___ response team.
- 9. SIEM tool from IBM.
Down
- 1. A type of social engineering attack involving communication that pretends to be legitimate.
- 2. We are all cyber ___.
- 3. Used in cryptography to prove authenticity of a device, server, or user.
- 5. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- 8. Linux distro used for ethical hacking.