Intro To Cybersecurity
Across
- 1. Regain information
- 4. online theft to be someone else
- 6. Access to the internet network device
- 7. Digital currency that is decentralized
- 11. Center of a attention
- 12. Infected Software
- 16. Codes are used to secure data.
- 18. Impersonate someone else
- 19. a thief
Down
- 2. Mandatory
- 3. safe and sound
- 5. National Institute of Standards and Technology
- 8. Spot something
- 9. Connection without the need of physical wires
- 10. Web hosting service provider
- 13. Includes break or promotion
- 14. External Service
- 15. Wi-Fi security protocol that is strong
- 17. Difficult to proceed with
- 20. About electronics and the internet