Chapter 3
Across
- 4. What type of attack floods a target with data requests to make a site unavailable?
Down
- 1. What does BYOD stand for?
- 2. What should organizations implement to secure themselves from attacks?
- 3. What organization is mentioned as a resource for cybersecurity guidance?