CS CrsWrd Pzl

1234567891011121314151617181920
Across
  1. 1. faking identity or data
  2. 4. duel layered access verification
  3. 6. updating software for security
  4. 8. detect and prevent intrusions
  5. 11. protecting individual devices
  6. 13. exploits before patches released
  7. 14. secure data transmission protocols
  8. 17. data scrambling for privacy
  9. 19. weakness prone to exploitation
  10. 20. malicious software harming systems
Down
  1. 2. ethical hacking for assesssment
  2. 3. unique physical trait authentication
  3. 5. encrypts data for extortion
  4. 7. overwhelming traffic to disrupt
  5. 9. engineering manipulating people for access
  6. 10. unathorized accesss point
  7. 12. deceptive emails for stealing data
  8. 15. secure network connection tunnel
  9. 16. network security barrier
  10. 18. security information event management