Across
- 5. the protection of data and systems.
- 6. insurance that provides liability.
- 7. training to help educate about possible cyber threats.
- 8. software designed with malicious intent to steal/destroy data.
- 10. a type of malware used to encrypt files and obtain data.
- 13. protecting connected devices and networks from unauthorized access.
- 15. the conversion of readable data to encoded data.
- 16. protects data from physical actions.
- 17. insurance that covers losses money.
- 18. a group of steps that show how to execute a test.
- 19. an organization to help businesses manage cybersecurity risks.
- 20. a set of requirements to help create strong passwords.
Down
- 1. when someone pretends to be something to steal data.
- 2. changes made to a software to improve it.
- 3. helps cover a business's losses from a cyber attack.
- 4. saving data in a different secure and safe place in case data is lost.
- 9. encrypted security used to protect Wi-Fi networks.
- 11. stealing information from an unaware person through the internet.
- 12. a strategy made to protect businesses from threats.
- 14. an attack used to obtain sensitive data by acting as a trusted source.