Across
- 4. ………… are deliberate attempts by hackers to disrupt, damage or destroy computer network or systems
- 5. VIRTUAL …………… NETWORK
- 6. An example of (OT)
- 8. Supervisory Control & Data ……… System
- 9. A secret tunnel
Down
- 1. Stands for Malicious Software
- 2. (IT) is Information Technology, (OT) is ………… Technology
- 3. Is a type of malware
- 5. Person are baited to click on a link or download a file
- 7. Refers to systems that operate production facilities
