Information Security Challenge

12345678910
Across
  1. 2. A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
  2. 4. A formal review of systems and processes to ensure security and compliance.
  3. 5. The possibility of loss, damage, or any negative outcome resulting from a threat exploiting a vulnerability.
  4. 8. A sneaky way to steal information by watching someone type their password.
  5. 10. Manipulating people into giving up confidential information.
Down
  1. 1. Protecting data and systems hosted on remote servers.
  2. 3. A type of malicious software that can replicate and spread.
  3. 6. Procedure for documenting and notifying security breaches.
  4. 7. An individual who uses technical skills to gain unauthorized access to systems or data
  5. 9. Software designed to detect and remove malicious programs.