Cyber Security
Across
- 3. data encryption ransom
- 6. compromised computer network
- 7. psychological manipulation
- 9. system manager
- 10. identifying threats
- 14. unwanted advertisements
- 15. multiple verification layers
- 16. secret access keys
- 18. protecting digital systems.
- 19. interconnected devices
Down
- 1. stolen identity
- 2. data encrypt
- 4. secure network connection
- 5. wireless technology
- 6. unauthorized access point
- 8. internet address
- 11. malicious digital actions
- 12. digital information
- 13. malicious software
- 17. computer programs