Project Three Part Two

12345678910
Across
  1. 2. Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
  2. 4. a kind of bullying or harassment that takes place via the internet.
  3. 5. The skill of writing and solving codes, or the study of codes.
  4. 7. a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
  5. 8. cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
  6. 10. a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
  1. 1. Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
  2. 3. the technique of defending vital systems and sensitive data against cyber-attacks.
  3. 6. any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
  4. 9. A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.