Across
- 2. Security or house
- 7. Password attack method
- 8. Doesn'trequire a host file to replicate itself
- 9. This horse can stampede your security defenses
- 11. Who is responsible for cybersecurity
- 12. Verifying identity
- 14. Unauthorized access to a network
- 17. Scrambling text into an unreadable format
- 19. Similar to a password
Down
- 1. Any crime committed electronically
- 3. Watches where you go on the internet
- 4. Multi-factor authentication
- 5. Cyber awareness month
- 6. Wireless technology using short-wave UHF radio waves
- 10. Attack attempt to acquire personal information
- 13. Prevents unauthorized access to or from a private network
- 15. The address of a webpage
- 16. Program that is designed to automate tasks
- 18. Chief information security officer