Cyber
Across
- 1. Email scam tactic
- 3. Network protection
- 4. Private browsing tunnel
- 5. Unique authentication method
- 7. Data security
- 9. Vulnerability exploitation tactic
Down
- 1. Fake website redirection
- 2. Isolated software testing environment
- 6. Data encryption extortion
- 8. Cyber threats