Cyber Security

12345678910111213141516171819
Across
  1. 3. data encryption ransom
  2. 6. compromised computer network
  3. 7. psychological manipulation
  4. 9. system manager
  5. 10. identifying threats
  6. 14. unwanted advertisements
  7. 15. multiple verification layers
  8. 16. secret access keys
  9. 18. protecting digital systems.
  10. 19. interconnected devices
Down
  1. 1. stolen identity
  2. 2. data encrypt
  3. 4. secure network connection
  4. 5. wireless technology
  5. 6. unauthorized access point
  6. 8. internet address
  7. 11. malicious digital actions
  8. 12. digital information
  9. 13. malicious software
  10. 17. computer programs