Across
- 2. A system that monitors and controls industrial processes
- 4. An unauthorized act of bypassing security mechanisms
- 6. A secret word or phrase used to authenticate access
- 8. A security flaw that can be exploited
- 9. Protection of sensitive information from unauthorized access
Down
- 1. A unique identifier for a network device
- 3. The practice of securing computer systems and networks
- 5. An act of gaining unauthorized access to systems and networks
- 6. A device used to control the flow of electricity in OT systems
- 7. A network security system that monitors and controls incoming and outgoing network traffic