Across
- 2. A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
- 4. A formal review of systems and processes to ensure security and compliance.
- 5. The possibility of loss, damage, or any negative outcome resulting from a threat exploiting a vulnerability.
- 8. A sneaky way to steal information by watching someone type their password.
- 10. Manipulating people into giving up confidential information.
Down
- 1. Protecting data and systems hosted on remote servers.
- 3. A type of malicious software that can replicate and spread.
- 6. Procedure for documenting and notifying security breaches.
- 7. An individual who uses technical skills to gain unauthorized access to systems or data
- 9. Software designed to detect and remove malicious programs.
