Cybersecurity
Across
- 3. Make data unreadable
- 4. lock computer force payment
- 9. Verify identity
- 10. Pretending to be someone else
Down
- 1. Recover unreadable data
- 2. online attacks
- 5. the space online
- 6. Secure HTTP
- 7. Oh, I forgot my
- 8. Deceiving to obtain info