Cybersecurity

12345678910111213141516171819
Across
  1. 3. Data Hostage
  2. 4. Data Recovery
  3. 5. Logs, Activity Tracking
  4. 7. Unique Authentication
  5. 8. Fake Identity
  6. 10. Secure Data
  7. 14. Virus Threats
  8. 15. Isolated Testing
  9. 17. Layered Authentication
  10. 18. Fake Emails
  11. 19. Engineering, Manipulative Tactics
Down
  1. 1. Unpatched Vulnerability
  2. 2. Security, Device Protection
  3. 6. Fake emails
  4. 9. Network Protection
  5. 11. Extra Verification
  6. 12. Insurance, Risk Coverage
  7. 13. Secure Connection
  8. 16. Network Overload
  9. 18. Software Updates