Group 1 - CSE 167

1234567891011
Across
  1. 4. What's the weakest element in Cybersecurity
  2. 5. The fake folder that acts as bait for hackers.
  3. 8. The I in the CIA Triad
  4. 10. The A in the CIA Triad
  5. 11. All companies should have a ____ framework
Down
  1. 1. The C in the CIA Triad
  2. 2. An area that a hacker can use for their benefit
  3. 3. Websites identify
  4. 6. A type of key to use in Asymmetric encryption
  5. 7. How to make a message secret.
  6. 9. A copy of data that could be lost