Across
- 2. Making copies of data
- 6. Tech Support Company
- 7. Don't open ___ from people you don't know
- 8. WCTA is ____ years old
- 9. Use ____ passwords
- 11. The capacity of a telecom line to carry signals
- 12. Network security system used to stop unauthorized access
- 13. Communication over a distance
- 14. A piece of code that is capable of destroying data
Down
- 1. Board President
- 3. NIST involves strategies for ____
- 4. The activity of defrauding by posing as a legit business
- 5. Someone who seeks to exploit weaknesses in a network
- 10. What is a CDR?