Cybersecurity
Across
- 6. preventing denial of action
- 9. ensuring accessability
- 10. barrier to protect network
- 11. targeting high profile individuals
- 12. overwhelming resources
- 15. guiding behavior
- 16. keeping data secret
- 18. self-replicating program
- 19. weakness in system
- 20. coding to protect data
Down
- 1. interfering with communication
- 2. harmful software
- 3. suspicious activity
- 4. unwanted email
- 5. verifying who you are
- 7. deceptive email
- 8. date-holding software
- 13. granting access to data
- 14. ensuring accuracy
- 17. protection of computer system from cyberthreats