Across
- 1. Software designed to detect and remove malicious programs.
- 4. Following rules, regulations, and standards in cybersecurity.
- 7. Manipulating people into giving up confidential information.
- 9. The practice of protecting systems, networks, and data from digital threats.
- 10. Protecting data and systems hosted on remote servers.
Down
- 2. A sneaky way to steal information by watching someone type their password.
- 3. Ensuring data is accurate and has not been tampered with.
- 5. An unexpected event that compromises the integrity or availability of data.
- 6. A type of malicious software that can replicate and spread.
- 8. A formal review of systems and processes to ensure security and compliance.
