Across
- 2. __ safeguards intended for the actual users
- 7. IT firm that was subject of a Russian cyberattack
- 8. always practice ____ password management to prevent against cyberattacks
- 9. another work for SMS-based phishing
- 10. __ safeguards intended for software and hardware
- 11. process of preventing unauthorized access to IT systems
Down
- 1. you can download ____ software to protect your devices
- 3. cyberattack that demands a ransom payment
- 4. name of criminal organization that hacked into the IT network of Colonial Pipeline
- 5. this country was the subject of a Russian cyberattack in 2007
- 6. most common form of cyberattack