s26

12345
Across
  1. 2. A technique for examining the contents of data packets
  2. 4. Software that collects information about users without their knowledge
  3. 5. A physical separation between networks to prevent unauthorized access
Down
  1. 1. A method used to break encryption by trying all possible keys
  2. 3. The part of a virus or worm that performs the malicious action
  3. 4. Security Operations Center, where security analysts monitor and manage threats