SKY VENGER HUNT

123456789
Across
  1. 4. ………… are deliberate attempts by hackers to disrupt, damage or destroy computer network or systems
  2. 5. VIRTUAL …………… NETWORK
  3. 6. An example of (OT)
  4. 8. Supervisory Control & Data ……… System
  5. 9. A secret tunnel
Down
  1. 1. Stands for Malicious Software
  2. 2. (IT) is Information Technology, (OT) is ………… Technology
  3. 3. Is a type of malware
  4. 5. Person are baited to click on a link or download a file
  5. 7. Refers to systems that operate production facilities