Intro Cybersecurity Puzzle 2

1234567891011121314151617
Across
  1. 2. Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
  2. 3. Another form of single sign on, initially supported by Twitter and Google
  3. 6. Biometrics is an example of something you _____
  4. 7. single sign-on authentication, think three headed dog
  5. 8. A key fob is an example of something you _____
  6. 10. A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
  7. 13. Robot Network
  8. 15. Acronym for Industrial Control Systems Supervisory Software
  9. 17. Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
  1. 1. The infected computer in a network of computers with infected malware
  2. 4. Your location to sign in is an example of somewhere you _____
  3. 5. the process of converting a given key into another value. If they are the same this is known as collision.
  4. 9. An emerging technology used in cryptocurrency
  5. 11. Acronym for "Smart Devices" over the internet
  6. 12. Your password is an example of something you _____
  7. 14. Acronym for Anything as a service
  8. 16. The acronym for the masterbot centralization