CyberSecurity Awareness
Across
- 2. being hidden from public view
- 5. Multi-____ Authentication
- 6. conversion of information to code
- 7. "Enter your username and ______."
Down
- 1. fake correspondence sent by a 'Nigerian Prince'
- 3. Security Assurance for the Federal Reserve
- 4. security protocols; organized into 'families'