InfoSec Puzzle Quest

123456789
Across
  1. 2. A type of malicious software that can replicate and spread.
  2. 5. Security Protecting data and systems hosted on remote servers.
  3. 7. Following rules, regulations, and standards in cybersecurity.
  4. 8. A formal review of systems and processes to ensure security and compliance.
  5. 9. Manipulating people into giving up confidential information.
Down
  1. 1. The practice of protecting systems, networks, and data from digital threats.
  2. 3. Ensuring data is accurate and has not been tampered with.
  3. 4. Surfing A sneaky way to steal information by watching someone type their password.
  4. 6. An unexpected event that compromises the integrity or availability of data.
  5. 8. Software designed to detect and remove malicious programs.