Across
- 3. scrambled data
- 5. security incident where confidential data is accessed
- 7. a key that can be used by anyone to encrypt messages
- 8. key only used by one individual to decrypt
- 10. person who has permission to hack
- 11. layers of control
- 13. using the same keys
- 14. person who does not have permission to hack
- 15. readable data
Down
- 1. command to make a directory
- 2. access point that is susceptible to hacking
- 4. copy of data
- 6. field to protect information on the internet
- 9. a trap for cybersecurity criminals
- 12. command to create a file