Across
- 3. One's own device for work
- 7. Cybersecurity career peak
- 8. Security for malware
- 9. Mastery of Network defense
- 11. Protection for user account
- 12. Destructive single malware
- 14. Online harassment
- 15. Disguised cyber attack
- 16. Malicious hackers
- 17. Network device identity
- 19. Plans security measures
Down
- 1. Entry level certification
- 2. Pay to release lockout
- 4. Secure remote private network
- 5. Network traffic control
- 6. cloud security certification
- 10. Malicious altered media
- 13. Secure scrambled data
- 14. Intermediate hacker mastery
- 18. Surveillance malware