Across
- 2. coding files to hide their contents
- 4. using fraudulent emails to access information
- 8. device on a network with no use other use besides tricking bad actors
- 11. determining the importance of each item
- 12. US law that prohibits avoiding copyright controls
- 15. online document that verifies authenticity
Down
- 1. to find additional ways to remain within an attack surface for a time
- 3. crimes that target and or use computers / computer systems
- 5. stores public and private keys
- 6. cipher that replaces each letter uniquely through rotation
- 7. controls on real world access
- 9. weakness in a system, policy, etc.
- 10. situation that poses potential dangers
- 13. keeping information secret
- 14. intentionally bad programs added to devices