CyberSecurity
Across
- 2. Router Security Protocol
- 4. Action for infected computer
- 7. One part of user's credentials
- 8. social engineering by phone
Down
- 1. malware lockouts
- 3. Dual Authentication
- 5. security of non-public data
- 6. Social engineering by text