Across
- 1. CYBER CRIME IS TRANSPARENT OR TRANSNATIONAL
- 3. A PASSWORD SUCH "obxxn45499bnLLLL" IS AN EXAMPLE OF WHAT TYPE OF PASSWORD, COMPLEX OR SIMPLE
- 8. THE C IN CIA MODEL FOR CYBER SECURITY MEANS WHAT
- 10. WHAT DOES THE D STAND FOR IN THE ACRONYM OF THE ITADA ACT OF 1998
- 11. IN CONTRAST TO STOCHASTIC, THIS RISK RESULT FROM DELIBERATE CONDUCT.
Down
- 2. MEANS PROTECTING INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED ACCESS, USE OR DISCLOSURE
- 4. OCCASIONALLY REFERRED TO AS THE YOU-CAN-SPAM ACT
- 5. PHENOMENON THAT REQUIRES GLOBAL LEGAL STRATEGIES
- 6. EXAMPLE OF PREVENTIVE CONTROL, FIREWALLS OR SPOOFING
- 7. RISK THAT ARE OUTSIDE ANYONE'S DIRECT CONTROL
- 9. a law that was enacted by the UnitedStates Congress in 1986. It forms part of the Electronic Communications PrivacyAct and is codified as 18 U.S.C. sections 2701–2712.
