Cybersecurity Week 3

1234
Across
  1. 2. This is a popular programming language used in security scripts.
  2. 4. This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
Down
  1. 1. What is the process of converting information or data into a code, especially to prevent unauthorized access?
  2. 3. ______ detection is the process of identifying cyberattacks trying to enter a machine or network.
  3. 4. A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization.