Information and Cyber Security

123456789
Across
  1. 1. uses asymmetric key encryption
  2. 3. person who performs a social engineering attack
  3. 7. What will freezing your credit not affect?
  4. 8. For online shopping it's best to use...?
Down
  1. 1. most valuable to companies looking to sell you something
  2. 2. Requires a carrier file to self-replicate
  3. 3. What information do you need to set up a wireless access point?
  4. 4. When is it ok to reuse a password?
  5. 5. Cyber security month
  6. 6. Weakest link in cybersecurity
  7. 9. Continually bombarding a targeted network with fake requests