Across
- 2. A technique for examining the contents of data packets
- 4. Software that collects information about users without their knowledge
- 5. A physical separation between networks to prevent unauthorized access
Down
- 1. A method used to break encryption by trying all possible keys
- 3. The part of a virus or worm that performs the malicious action
- 4. Security Operations Center, where security analysts monitor and manage threats
