Cybersecurity

1234567891011121314151617181920
Across
  1. 6. preventing denial of action
  2. 9. ensuring accessability
  3. 10. barrier to protect network
  4. 11. targeting high profile individuals
  5. 12. overwhelming resources
  6. 15. guiding behavior
  7. 16. keeping data secret
  8. 18. self-replicating program
  9. 19. weakness in system
  10. 20. coding to protect data
Down
  1. 1. interfering with communication
  2. 2. harmful software
  3. 3. suspicious activity
  4. 4. unwanted email
  5. 5. verifying who you are
  6. 7. deceptive email
  7. 8. date-holding software
  8. 13. granting access to data
  9. 14. ensuring accuracy
  10. 17. protection of computer system from cyberthreats