Cyber Security
Across
- 3. Facts/statistics and information
- 4. Technique to acquire sensitive data
- 6. A private network that is virtual
- 7. Operating Information used by a computer
- 10. Power to enforce obedience
- 11. Criminals that use technology
- 14. Something that gives safety
- 15. Having protection from danger
- 17. Proving something is true
- 18. Malware designed to deny access to files on your computer
Down
- 1. Violation of something
- 2. Being responsible for something
- 5. Protocol designed to protect communication over a network
- 6. State of being exposed to and attack
- 8. Converting data or information into code
- 9. Compliance with rules/standards
- 12. A person who pretends to be someone else
- 13. A fraud
- 15. Sending emails with a fake senders address
- 16. Digital currency