Chapter 3

1234
Across
  1. 4. What type of attack floods a target with data requests to make a site unavailable?
Down
  1. 1. What does BYOD stand for?
  2. 2. What should organizations implement to secure themselves from attacks?
  3. 3. What organization is mentioned as a resource for cybersecurity guidance?