Across
- 1. Insider
- 7. Killchain
- 9. Antivirus
- 11. People
- 14. cyber
- 15. Firewall
- 16. Encryption
- 17. Confidentiality
- 18. Availability
- 19. Protection
Down
- 2. Security
- 3. Attack
- 4. Threat
- 5. Motivation
- 6. Monitor
- 8. Integrity
- 10. Vulnerability
- 12. Product
- 13. Resilience
- 20. Risk
