CYBERSECURITY
Across
- 1. transforming plaintext or cleartext into ciphertext.
- 4. planning and maintaining organization safe in cyberspace.
- 5. used to prove one's identity, or authorize access to a resource.
- 7. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
- 2. practice of sending fraudulent messages that appear to come from a reputable source.
- 3. attaches itself with host file and replicates.
- 6. unwanted or unsolicited communications typically received via e-mail.