Cybersecurity Applications

12345678910
Across
  1. 4. An attacker might attempt to trick someone through manipulation or deception.
  2. 6. to prevent vulnerabilities and injection attacks.
  3. 8. determines what actions they are allowed to perform
  4. 10. The process of verifying the identity of a user or device
Down
  1. 1. Systems can detect and respond to potential security threats
  2. 2. An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
  3. 3. to regulate who can access what resources
  4. 5. to keep software and firmware updated to protect against known vulnerabilities
  5. 7. It is important to secure data
  6. 9. You must secure the actual, tangible devices.