Across
- 1. faking identity or data
- 4. duel layered access verification
- 6. updating software for security
- 8. detect and prevent intrusions
- 11. protecting individual devices
- 13. exploits before patches released
- 14. secure data transmission protocols
- 17. data scrambling for privacy
- 19. weakness prone to exploitation
- 20. malicious software harming systems
Down
- 2. ethical hacking for assesssment
- 3. unique physical trait authentication
- 5. encrypts data for extortion
- 7. overwhelming traffic to disrupt
- 9. engineering manipulating people for access
- 10. unathorized accesss point
- 12. deceptive emails for stealing data
- 15. secure network connection tunnel
- 16. network security barrier
- 18. security information event management
