CyberSecurity
Across
- 2. Protects your Privacy
- 3. bits created to unscramble and scramble data
- 6. responsible for data
- 7. Secures digital data
- 8. Owns data
- 10. proof that a package is sented
- 11. describes a computer network
Down
- 1. Order
- 4. shared key used to encrypt or decrypt text
- 5. uneven bars
- 6. technique used to validate messages
- 9. Uses Data