Across
- 4. is the act of skirting or breaking through security boundaries.
- 7. a type of hacker that is generally ethical and law-abiding.
- 8. focuses on keeping applications or programs secure throughout their lifecycle.
- 12. certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- 1. is based on the key concepts of information assurance.
- 2. an attack in which the attacker is connectedto a network and monitors an authenticated session.
- 3. a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- 5. Is the protection of digital devices and their connected networks from danger and threats.
- 6. a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- 9. prevents and protects unauthorized intrusions into the network.
- 10. which is a set of security controls designed to protect payment account security.
- 11. includes threats such as viruses, worms, Trojan horses.