Cybersecurity

123456789101112131415
Across
  1. 2. coding files to hide their contents
  2. 4. using fraudulent emails to access information
  3. 8. device on a network with no use other use besides tricking bad actors
  4. 11. determining the importance of each item
  5. 12. US law that prohibits avoiding copyright controls
  6. 15. online document that verifies authenticity
Down
  1. 1. to find additional ways to remain within an attack surface for a time
  2. 3. crimes that target and or use computers / computer systems
  3. 5. stores public and private keys
  4. 6. cipher that replaces each letter uniquely through rotation
  5. 7. controls on real world access
  6. 9. weakness in a system, policy, etc.
  7. 10. situation that poses potential dangers
  8. 13. keeping information secret
  9. 14. intentionally bad programs added to devices