Cybersecurity
Across
- 3. when your data is confidential, available and keeps it's integrity
- 5. a special way of decrypting a cipher such as pigpen, morse code, or caesar
- 7. internet of things
- 8. hacker that does bad
- 9. words or text that needs a key to decode
- 10. hacker that does good but without permission
Down
- 1. hiding a file or text in a picture
- 2. hacking people without code
- 4. authentication that is something you are, know or have
- 6. hacker that does good