Information and Cyber Security
Across
- 1. uses asymmetric key encryption
- 3. person who performs a social engineering attack
- 7. What will freezing your credit not affect?
- 8. For online shopping it's best to use...?
Down
- 1. most valuable to companies looking to sell you something
- 2. Requires a carrier file to self-replicate
- 3. What information do you need to set up a wireless access point?
- 4. When is it ok to reuse a password?
- 5. Cyber security month
- 6. Weakest link in cybersecurity
- 9. Continually bombarding a targeted network with fake requests