Across
- 2. This is a popular programming language used in security scripts.
- 4. This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
Down
- 1. What is the process of converting information or data into a code, especially to prevent unauthorized access?
- 3. ______ detection is the process of identifying cyberattacks trying to enter a machine or network.
- 4. A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization.