Across
- 4. What's the weakest element in Cybersecurity
- 5. The fake folder that acts as bait for hackers.
- 8. The I in the CIA Triad
- 10. The A in the CIA Triad
- 11. All companies should have a ____ framework
Down
- 1. The C in the CIA Triad
- 2. An area that a hacker can use for their benefit
- 3. Websites identify
- 6. A type of key to use in Asymmetric encryption
- 7. How to make a message secret.
- 9. A copy of data that could be lost