Cybersecurity Terms

123456789101112131415
Across
  1. 3. scrambled data
  2. 5. security incident where confidential data is accessed
  3. 7. a key that can be used by anyone to encrypt messages
  4. 8. key only used by one individual to decrypt
  5. 10. person who has permission to hack
  6. 11. layers of control
  7. 13. using the same keys
  8. 14. person who does not have permission to hack
  9. 15. readable data
Down
  1. 1. command to make a directory
  2. 2. access point that is susceptible to hacking
  3. 4. copy of data
  4. 6. field to protect information on the internet
  5. 9. a trap for cybersecurity criminals
  6. 12. command to create a file