Cybersecurity Threats and Defenses

12345678910
Across
  1. 5. Fake website designed to steal credentials
  2. 6. Protects data on a wireless network
  3. 7. Continuous monitoring of network traffic
  4. 8. Security test that simulates a real attack
  5. 10. Prevents unauthorized physical entry to a secure area
Down
  1. 1. A malicious attack that floods a system with traffic
  2. 2. Secures communication over the internet
  3. 3. Framework of rules and policies governing security
  4. 4. Keeps track of system events for auditing
  5. 9. Hidden malicious code inserted into software