Info Security

12345678910
Across
  1. 6. Proactive promise to mitigate cyber risks.
  2. 7. Digital protection against online threats.
  3. 8. software intentionally designed to cause damage to a computer, server, or network.
  4. 9. a potential danger or a malicious actor who could exploit a vulnerability to cause harm
  5. 10. A technology that creates a secure, encrypted connection over a less secure network like the internet
Down
  1. 1. The process of scrambling data to make it unreadable without a key
  2. 2. process of verifying a user's identity
  3. 3. A social engineering attack that uses fraudulent emails or messages to trick people into revealing sensitive information
  4. 4. ensure that a business can continue to operate and deliver essential products or services
  5. 5. A network security system that monitors and controls incoming and outgoing network traffic