ESCAPE THE HACKER CROSSWORD
Across
- 3. MULTIPLE FORMS OF AUTHENTICATION
- 5. ENCRYPTED CONNECTION USED FOR SECURE BROWSING
Down
- 1. TRICKS USERS INTO REVEALING SENSITIVE INFORMATION
- 2. MONITOR THE INCOMING AND OUTGOING TRAFFIC IN A NETWORK
- 4. EXPLOITATION OF COMPUTER SYSTEMS AND NETWORKS