Across
- 2. Network security system used to stop unauthorized access
- 4. Someone who seeks to exploit weaknesses in a network
- 6. Making copies of data
- 8. Tech Support Company
- 9. Communications over a distance
- 10. Don't open ____ from people you don't know
- 13. Use ____ passwords
Down
- 1. What is a CDR?
- 3. A piece of code that is capable of destroying data
- 5. The capacity of a telecom line to carry signals
- 7. The activity of defrauding by posting as a legitimate business
- 11. NIST involves strategies for ____
- 12. Board President