Across
- 1. Political factors influencing behavior in cybersecurity
- 4. Measures to protect against cyber threats.
- 6. AI enabling systems to learn from data.
- 7. Total points vulnerable to cyber attacks.
Down
- 2. Actions in cyberspace for security or attack.
- 3. Actions to exploit vulnerabilities in systems.
- 5. Intelligence Machines simulating human intelligence processes.