Across
- 5. Fake website designed to steal credentials
- 6. Protects data on a wireless network
- 7. Continuous monitoring of network traffic
- 8. Security test that simulates a real attack
- 10. Prevents unauthorized physical entry to a secure area
Down
- 1. A malicious attack that floods a system with traffic
- 2. Secures communication over the internet
- 3. Framework of rules and policies governing security
- 4. Keeps track of system events for auditing
- 9. Hidden malicious code inserted into software
