Across
- 2. Cybersecurity law enforcement
- 5. Cybersecurity best practice
- 6. Cyber incident investigation
- 9. Malicious software
- 10. Cybersecurity breach response
- 12. Data encryption algorithm
- 13. Cybersecurity compliance standard
- 14. Protection against data breaches
- 16. Cybersecurity training platform
- 17. Encryption method
- 18. Cybersecurity Framework acronym
- 19. Protection against malware
- 21. Secure data storage
Down
- 1. Cybersecurity awareness program
- 3. Secure access authentication
- 4. Cyberattack type
- 7. Authentication method
- 8. Digital forensic tool
- 11. Unauthorized access prevention
- 15. Digital evidence examination
- 20. Secure network protocol