Across
- 2. Monitoring systems for suspicious activity in real-time
- 5. Attack using social engineering via email attachments
- 8. Policy requiring strong, unique passwords regularly changed
- 9. Fake app or update that steals banking credentials
- 10. Software scanning for and removing malware
Down
- 1. Encryption of data at rest to protect confidentiality
- 3. Network of compromised devices used for attacks
- 4. Unauthorized access to a system or account
- 6. Attack stealing session cookies to impersonate users
- 7. Malicious software that spreads by exploiting vulnerabilities
