CYBERSECURITY
Across
- 2. Online storage.
- 3. Decryption necessity.
- 4. Securely lock files.
- 5. Harmful software.
- 8. Fake software tactic.
Down
- 1. Ransomware type.
- 2. Encrypting malware.
- 6. Ensuring privacy.
- 7. Data preservation.
- 9. Remote access method.