Across
- 2. A type of malicious software that can replicate and spread.
- 5. Security Protecting data and systems hosted on remote servers.
- 7. Following rules, regulations, and standards in cybersecurity.
- 8. A formal review of systems and processes to ensure security and compliance.
- 9. Manipulating people into giving up confidential information.
Down
- 1. The practice of protecting systems, networks, and data from digital threats.
- 3. Ensuring data is accurate and has not been tampered with.
- 4. Surfing A sneaky way to steal information by watching someone type their password.
- 6. An unexpected event that compromises the integrity or availability of data.
- 8. Software designed to detect and remove malicious programs.
