CyberSecurityCIS120
Across
- 1. Pay me to get your info back
- 4. Malicious Software
- 7. I guard incoming and outgoing traffic
- 11. Keep info on multiple networks
- 13. Robot Network
- 15. Non-plain text
- 16. A plan for me to not loose data
- 17. Your own private network
- 19. Multiple types of authentication
- 20. Phishing but for high targets
Down
- 2. psychological manipulation
- 3. I'm a hacker trap
- 5. Used more for database attacks
- 6. Irreversible fixed-length string
- 8. Denial of Service
- 9. An intrusion of data
- 10. Previously unknown vulnerability
- 12. Finding info that's public
- 14. Trying multiple passwords in a short time
- 18. Don't get hooked!